Search
Keyword: linux
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
NOTES: Heuristic Detection This is the Trend Micro heuristic detection for suspicious files that manifest the characteristics of an exploited Linux vmsplice() function.
Step 1 For Trend Micro Customers Scanning your system wit...
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. However, as of this writing, the said sites are inaccessible.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It is a component of other malware.
Linux
Arrival Details This malware arrives via the following means: Downloaded by Trojan.SH.BROOTKIT.A Other Details This Rootkit does the following: It is used by Trojan.SH.BROOTKIT.B for its rootkit capabilities. It hides pro...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. As of this writing, the said sites are inaccessible.
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user, effectively compromising the affected system.
* indicates a new version of an existing rule Deep Packet Inspection Rules: HP Intelligent Management Center Dbman 1010213 - HPE Intelligent Management Center 'dbman' RestartDB Command Injection Vulnerability (CVE-2017-5816) Ma...
Use-after-free vulnerability in Adobe Flash Player before 13.0.0.269 and 14.x through 16.x before 16.0.0.305 on Windows and before 11.2.202.442 on Linux allows remote attackers to execute a...
* indicates a new version of an existing rule Deep Packet Inspection Rules: Advanced Message Queuing Protocol (AMQP) 1011585* - SolarWinds Network Performance Monitor Insecure Deserialization Vulnerabilities (CVE-2022-36957 and...
* indicates a new version of an existing rule Deep Packet Inspection Rules: Ceph Messenger Client 1011911* - Linux Kernel Buffer Overflow Vulnerability (CVE-2023-44466) Splunk Enterprise 1011912* - Splunk Enterprise Privileg...
* indicates a new version of an existing rule Deep Packet Inspection Rules: Microsoft Office 1008801 - Microsoft Office Memory Corruption Vulnerability (CVE-2017-11884) NTP Server Linux 1008320 - Network Time Protocol Daemon ...
* indicates a new version of an existing rule Deep Packet Inspection Rules: Ceph Messenger Client 1011911 - Linux Kernel Buffer Overflow Vulnerability (CVE-2023-44466) Elastic Kibana And Elasticsearch 1011909 - Elastic Kiba...
* indicates a new version of an existing rule Deep Packet Inspection Rules: CentOS Web Panel 1011887* - Control Web Panel Command Injection Remote Code Execution Vulnerability (CVE-2023-42123) NTP Server Linux 1009492* - NT...
* indicates a new version of an existing rule Deep Packet Inspection Rules: Fluent Bit HTTP 1012052 - Fluent Bit Memory Corruption Vulnerability (CVE-2024-4323) Nextgen Mirth Connect 1012008* - Nextgen Mirth Connect Insecure Des...
This backdoor executes commands from a remote malicious user, effectively compromising the affected system. It connects to a website to send and receive information.
SHELLSHOCK is capable of launching distributed denial-of-service (DDoS) attacks and also it is capable to do brute force logins.It can execute the following commands on compromised system: UDP - Perform UDP flooding TCP - Perform TCP flooding LOLNOGT...
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.