Keyword: sent
300 Total Search   |   Showing Results : 81 - 100
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution.
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution.
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution.
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution.
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
In a campaign we observed at the beginning of September 2020, spammers have aimed to spread tech support scams via email. The spammed message, which claims to come from a senior man...
This iOS malware is related to the SEDNIT malware family. It is specifically designed for espionage on iOS devices. It steasl personal data, records audio, takes screenshots of the affected iOS device, and sends information to a remote command and co...
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It encrypts files with specific file extensions. It drops files as ransom note.
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user accesses the said website. It does not have any propag...
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user, effectively compromising the affected system.
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This malware is part of the leaked source code of Carbanak, as reported by FireEye in April 2019. This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It lis...
This malware is part of the leaked source code of Carbanak, as reported by FireEye in April 2019. This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It lis...
SIMBOT is a backdoor family that accesses certain remote servers in order to receive commands from a remote attacker. The following are the executed commands on the affected system: Download and executes files Execute a DOS command sent by the remote...
The application contains the vulnerable Moplus SDK, from Baidu. The SDK has backdoor like routines such as getting location, getting package information, pushing phishing pages, inserting arbitrary contacts, sending fake SMS, uploading local files to...
The application contains the vulnerable Moplus SDK, from Baidu. The SDK has backdoor like routines such as getting location, getting package information, pushing phishing pages, inserting arbitrary contacts, sending fake SMS, uploading local files to...
The application contains the vulnerable Moplus SDK, from Baidu. The SDK has backdoor like routines such as getting location, getting package information, pushing phishing pages, inserting arbitrary contacts, sending fake SMS, uploading local files to...
The application contains the vulnerable Moplus SDK, from Baidu. The SDK has backdoor like routines such as getting location, getting package information, pushing phishing pages, inserting arbitrary contacts, sending fake SMS, uploading local files to...