Search
Keyword: stuxnet
This malware is possibly connected with DUQU malware, which shares code similarities in STUXNET malware.To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.This Trojan executes its main SYS c...
Trend Micro has flagged this threat as noteworthy due to the increased potential for damage, propagation, or both, that it possesses.To get a one-glance comprehensive view of the behavior of this Worm, refer to the Threat Diagram shown below.This wor...
This malware is possibly connected with DUQU malware, which shares code similarities in STUXNET malware.To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.This Trojan is executed using certa...
The VOBFUS family of worms is known for their download and propagation routines, which allowed them to gain prominence, as can be seen in the family’s increasing number of variants over time. These worms are know...
; Now Also Spreading Through LICAT
In October, TrendLabsSM reported on PE_LICAT.A-O, a new malware that inserts its code into .EXE files, turning them into the downloader PE_LICAT.A, which generates and accesses URLs to download T...
Why is Conficker/DOWNAD still a persistent threat?
Conficker/DOWNAD became a huge threat back in its heyday because it explored a Windows vulnerability and of its various prolif...
This Hacking Tool arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.