Search
Keyword: pe_kaze.2056.a
Microsoft addresses the following vulnerabilities in its August batch of patches:
(MS11-057) Cumulative Security Update for Internet Explorer (2559049)
Risk Rating: Critical
This security up...
Microsoft addresses the following vulnerabilities in its August batch of
patches:
(MS10-046) Vulnerability in Windows Shell Could Allow Remote Code
Execution (2286198) Risk Rating: Critical
...
This Hacking Tool arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user accesses the said website.Once a user visits an affected...
Microsoft addresses the following vulnerabilities in its February batch of patches:
(MS11-003) Cumulative Security Update for Internet Explorer (2482017)
Risk Rating: Critical
This security update a...
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It opens random ports. It executes commands from a remote malicious user, effectively compromising the af...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It deletes itself after execution.
This worm may be downloaded by other malware/grayware/spyware from remote sites. It may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites.It deletes registry entries, causing some applications ...
On June 25, 2013, South Korea was hit with a cyber attack that affected several local government and news sites. We managed to track some of the attacks that made up this event: (1) the co...
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user accesses the said website.It requires being executed w...
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user accesses the said website.It requires being executed w...
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It executes commands from a remote malicious user, effectively compromising the affected system.
Microsoft addresses the following vulnerabilities in its December batch of patches:
(MS11-087) Vulnerability in Windows Kernel-Mode Drivers Could Allow Remote Code Execution (2639417)
Risk Ra...
Once executed, it will pose as a legitimate Flash game. However, upon clicking, this joke program displays a video of a male ghost.This joke program arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users ...
This Hacking Tool arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It requires being executed with a specific argument/parameter, an additional component, or in a speci...
This Adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It requires being executed with a specific argument/parameter, an additional component, or in a specific en...
This malware exploits the vulnerability in Microsoft XML Core Services, which prompted Microsoft to release a fix tool. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.This Trojan arrive...
We received a spam sample that spoofs its 'From' field to look like an email report from the United States Computer Emergency Readiness Team or the US-CERT. It's a bit of an irony that the sample purpo...
Microsoft addresses the following vulnerabilities in its December batch of patches:
(MS13-096) Vulnerability in Microsoft Graphics Component Could allow Remote Code Execution (2908005)
Ris...
This malware figures in a Shellshock-related SMTP attack. To get a one-glance comprehensive view of the behavior of this Backdoor, refer to the Threat Diagram shown below.This Backdoor arrives on a system as a file dropped by other malware or as a f...