Search
Keyword: osx
24 Total Search |
Showing Results : 1 - 20
This potentially unwanted application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This malware was involved in the March 2016 compromise of a popular bittorent client website, where it was passed off as a legitimate upgrade installer. The first ransomware to exclusively target OSX machines, users affected by this malware may find ...
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may arrive bundled with malware packages as a malware component.
This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It connects to a website to send and receive information. It gathers information and reports it to its servers.
This OSX malware was used in the targeted attack campaign named Careto. The attack was noted for encoding its configuration data and encrypting its network traffic. To get a one-glance comprehensive view of the behavior of this Backdoor, refer to the...
This Coinminer arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Backdoor may be unknowingly downloaded by a user while visiting malicious websites. It executes commands from a remote malicious user, effectively compromising the affected system.
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user, effectively compromising the affected system.
Component of Magnitude and Nuclear Exploit Kit exploiting CVE-2016-1019
{(Related thread: RE: [Noteworthy] APSA16-01 (CVE-2016-1019 )} This Trojan executes when a user accesses certain websites where it is hosted. It requires its main component to ...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user, effectively compromising the affected system. It connec...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It attempts to access certain websites. However, the websites are inaccessible as of this writing.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It attempts to access certain websites. However, the websites are inaccessible as of this writing.
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan may be unknowingly downloaded by a user while visiting malicious websites.
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user, effectively compromising the affected system.
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be dropped by other malware. It steals certain information from the system and/or the user.
WOLYX, or also known as ‘Olyx’, was first spotted in a package called PortalCurrent events-2009 July 5.rar , where the content suggests that it was extracted from Wikipedia community portal current events page. WOLYX variants usually drop its DLL com...
