Keyword: mbr-rootkit
300 Total Search   |   Showing Results : 61 - 80
This Boot malware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.The said files contain data it writes into the MBR (Master Boot Record). It does the said action to e...
This ransomware, also known as Bad Rabbit, reportedly spread to networks of some high profile companies located in Ukraine and Russia. It spreads via network shares. It also modifies the Master Boot Record (MBR) of an affected system. This Ransomware...
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It infects certain file types by inserting code in the said files. It infects the Master Boot Record...
This is Trend Micro detection for Master Boot Record (MBR) infected by TDSS family. The main TDSS component modifes the Master Boot Record of a system to execute its malicious file components stored in the disk.
This is Trend Micro detection for Master Boot Record (MBR) infected by TDSS family. The main TDSS component modifes the Master Boot Record of a system to execute its malicious file components stored in the disk.This is the Trend Micro detection for f...
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
The XPAJ family of file infectosr has been known since 2009. Its main purpose is to redirect infected users to click fraud, generating profit for its makers. It has gained capability to spread via mapped drives or shared folders, greatly improving it...
This Trojan may arrive bundled with malware packages as a malware component.
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users.
This Ransomware restarts the affected system.It encrypts files with specific file extensions. It encrypts files found in specific folders.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It executes then deletes itself afterward.It executes the dropped file(s). As a result, malicious routines ...
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It encrypts files with specific file extensions.
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It encrypts files with specific file extensions. It encrypts files found in specific folders.
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It encrypts files with specific file extensions. It drops files as ransom note.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It deletes itself after execution.
This malware uses complex routines to hide in the infected system's master boot record (MBR) in order to evade detection.To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.This Trojan connec...
This threat is a Master Boot Record (MBR) wiper that infected systems of a major Korean electric utility. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.This Trojan may be dropped by o...
On June 25, 2013, South Korea was hit with a cyber attack that affected several local government and news sites. We managed to track some of the attacks that made up this event: (1) the co...
This malware is involved in the Master Boot Record (MBR) wiper outbreak that targeted users in South Korea during March of 2013. It drops and executes malware on affected systems, including a destructive payload that wipes the affected system's MBR....
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It executes then deletes itself afterward.It connects to certain websites to send and receive information.