Keyword: sent
300 Total Search   |   Showing Results : 121 - 140
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution.
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes then deletes itself afterward.
This worm arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It gathe...
This Trojan Spy may be downloaded by other malware/grayware from remote sites.
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user, effectively compromising the affected system. It conn...
BANKER variants may arrive on a system via spammed email messages, or as a file dropped by other malware or unknowingly downloaded by the user when visiting malicious sites. BANKER malware attempt to steal sensitive information, such as banking crede...
This Hacking Tool arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It does not have any backdoor routine. It does not have an...
This Hacking Tool arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It does not have any backdoor routine. It does not have an...
This worm arrives by accessing affected shared networks. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It uses the default Windows folder icon to trick users int...
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It reads its configuration file that contains commands and data to be sent to a remote server. It modifi...
This Hacking Tool arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It does not have any backdoor routine. However, as of this writi...
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user, effectively compromising the affected system. It gath...
We continuously witness the evolution of QAKBOT, a sophisticated data stealer malware, come up with old and new techniques to bypass email security filters. We dive deep on this in the article '...
This malicious JavaScript downloads and executes a CryptoWall 3.0 ransomware variant and a FAREIT spyware. It comes as an archived file that is sent as an attachment in spammed messages. To get a one-glance comprehensive view of the behavior of this ...
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It reads its configuration file that contains commands and data to be sent to a remote server. It connect...
This malware is involved in the global financial network transfer system Swift hacking incident of April-May 2016. It is a crucial component of the malware that performs the SWIFT message tampering that then causes financial theft. This spyware arri...
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It exe...
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be dropped by other malware. It executes then deletes itself afterward.