Keyword: sednit
20 Total Search   |   Showing Results : 1 - 20
   Next  
This iOS malware is related to the SEDNIT malware family. It is specifically designed for espionage on iOS devices. It steasl personal data, records audio, takes screenshots of the affected iOS
Description Name: APT - SEDNIT - HTTP (Request) - Variant 4 . This is Trend Micro detection for packets passing through HTTP network protocols that can be used as Command and Control Communication. This also indicates a malware infection. Below are s...
Description Name: APT - SEDNIT - HTTP (Request) - Variant 2 . This is Trend Micro detection for packets passing through HTTP network protocols that can be used as Command and Control Communication. This also indicates a malware infection. Below are s...
Description Name: APT - SEDNIT - HTTP (Request) - Variant 3 . This is Trend Micro detection for packets passing through HTTP network protocols that can be used as Command and Control Communication. This also indicates a malware infection. Below are s...
chain, recipients get a spearphishing URL which leads to several redirections, finally pointing to the URL where the exploit is hosted. Another malware, detected as TROJ_DROPPR.CXC then drops this SEDNIT
another malware detected as TROJ_DROPPR.CXC, which in turn, drops a SEDNIT variant. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below. Operation
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user,
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan may be dropped by other malware. As of this writing, the said sites are inaccessible. It retrieves specific information from the affected system. Arrival Details This Trojan may be
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user,
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user,
This backdoor may be dropped by other malware. It connects to a website to send and receive information. It retrieves specific information from the affected system. Arrival Details This backdoor may
This spyware may arrive bundled with malware packages as a malware component. It may be dropped by other malware. It retrieves specific information from the affected system. Arrival Details This
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain websites to send and receive
This is the detection for the second stage malware related to the new Java zero-day exploit which was used in the targeted attack campaign, Operation Pawn Storm. In the second stage of the attack, it
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. Arrival Details This Trojan arrives as an attachment to the following email messages