Search
Keyword: js
            This spyware  attempts to steal information, such as user names and passwords, used when logging into certain banking or finance-related websites.
 This Potentially Unwanted Application  arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It does not have any backdoor routine....
 This Trojan  arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
 This Potentially Unwanted Application  arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
 This Adware  arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
 BANLOAD malware variants arrive on the systems as files dropped by other malware or as files downloaded unknowingly by users when visiting malicious sites. When executed, these connect to malicious URLs to download other malware on already infected s...
 BANLOAD malware variants arrive on the systems as files dropped by other malware or as files downloaded unknowingly by users when visiting malicious sites. When executed, these connect to malicious URLs to download other malware on already infected s...
 This Trojan  arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. However, as of this writing, the said sites are inaccessible.
 This Trojan  arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. However, as of this writing, the said sites are inaccessible.
 This Trojan  arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. However, as of this writing, the said sites are inaccessible.
 This Trojan  arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. However, as of this writing, the said sites are inaccessible.
 This Trojan  arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
 This Trojan  arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user accesses the said website.
 
We spotted a recent spam campaign in Italian that delivers URSNIF malware to unsuspecting users. The email deceives its recipients by posing as a notification with a link that leads to the supposed receip...
 This spyware  attempts to steal information, such as user names and passwords, used when logging into certain banking or finance-related websites.
 This Trojan  arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on...
 This Trojan  arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user accesses the said website. It executes the downloaded fi...
 This adware  arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
 This Trojan  modifies registry entries to disable various system services. This action prevents most of the system functions to be used. It does not have any propagation routine. It does not have any backdoor routine. It connects to certain websites ...
 This worm  arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops an AUTORUN.INF file to automatically execute the copies it drops w...
 