Search
Keyword: sent
300 Total Search |
Showing Results : 1 - 20
This Hacking Tool arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be manually installed by a user.
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user accesses the said website. It executes commands from a...
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It reads its configuration file that contains commands and data to be sent to a remote server. It requir...
EMOTET tries to amplify the scare by using the nCov 2019 virus outbreak in its latest spam campaign . Messages in Japanese and containing the EMOTET payload are sent to victims lured into opening...
Spam with malicious attachment disguised as a .JPG file have become rampant once again. However, the subject and body of the email are still the same bogus claims that aim to lure unsuspecting users into ...
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It reads its configuration file that contains commands and data to be sent to a remote server. It requir...
The Predator malware first appeared in July 2018 and is used to steal usernames, passwords, browser data and the contents of cryptocurrency wallets, as well as take photos using the infected victim's webcam. The malware is commonly sold on undergroun...
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This hacking tool arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be manually installed by a user. It uses a user interface (UI).
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It arrives as a component bundled with malware/grayware packages. It reads its configuration file that c...
Emotet first appeared in 2014 as a banking malware that attempted to infect computers and steal sensitive information. This malware mostly spreads by spam and phishing emails with infected attachments and embedded malicious URLs. It has worm-like cap...
Trickbot is a banking trojan used in attacks usually against small- and medium-sized businesses. It is designed to access online accounts, especially bank accounts, to obtain Personally Identifiable Information (PII). The obtained data is mostly used...
NEGASTEAL, also known as AGENT TESLA, is an information stealer written in Microsoft’s .NET language. It has keylogging and remote access Trojan (RAT) capabilities. It was discovered in 2014 and has been used in various malicious campaigns ever since...
This Android malware presents itself as a fake as a Chinese banking app. After installation, it keeps on requesting permission of notification access, enabling it to read notifications sent by the operating system or other applications. The notificat...
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain websites to send and receive information. It encrypts files found in specific f...
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user, effectively compromising the affected system.
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It steals certain information from the system and/or the user. It encrypts files found in specific fol...
This malware may be downloaded from links in email spam sent out by the malware WORM_KELIHOS.K. This Trojan may be unknowingly downloaded by a user while visiting malicious websites. It executes the downloaded files. As a result, malicious routines ...
This hacking tool arrives as a component bundled with malware/grayware packages. It may be manually installed by a user.
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be manually installed by a user.