Keyword: boot-sector-virus
300 Total Search   |   Showing Results : 101 - 120
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.However, as of this writing, the said sites are inaccessible.
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It infects files by overwriting code in the entry point and saving the overwritten code in the virus...
This Virus arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.As of this writing, the said sites are inaccessible.
Windows 2000, XP, Server 2003 NOTES: This is a Trend Micro detection for files with incomplete infection of PE_ZMIST.Ax. Because of the complexity of PE_ZMIST.Ax infection process, some hosts files are left with garbage instructions but ...
Windows 2000, XP, Server 2003 NOTES: This is a Trend Micro detection for files with incomplete infection of PE_ZMIST.Ax. Because of the complexity of PE_ZMIST.Ax infection process, some hosts files are left with garbage instructions ...
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It drops copies of itself into network drives.It also has rootkit capabilities, which enables it to hide its ...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It infects files by overwriting code in the entry point and saving the overwritten code in the virus...
This file infector hooks certain APIs so that when these APIs are called, the virus code is executed which then infects files. It does not infect files with certain characteristics. It returns execution to the host file's original code after executio...
This file infector infects target host files via EPO-Cavity-Appending infection technique.It hooks APIs so that when these APIs are called, the virus code is executed which then infect files.It does not infect files with certain characteristics.It al...
This file infector infects target host files via Cavity-Appending infection technique.It hooks APIs so that when these APIs are called, the virus code is executed which then infect files.It does not infect files with certain characteristics.It also s...
This file infector infects target host files via EPO-Cavity-Appending infection technique.It hooks APIs so that when these APIs are called, the virus code is executed which then infect files.It does not infect files with certain characteristics.It al...
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It encrypts files found in specific folders.
Industrial control systems (ICS)/SCADA systems have become an area of focus in the security industry due to previous high profile attacks like FLAME and Stuxnet. Despite their significance—these systems are ...
This Trojan may be unknowingly downloaded by a user while visiting malicious websites.
This Virus arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.