Search
Keyword: unauthorized file encryption
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
It may be unknowingly downloaded by a user while visiting malicious websites.It adds registry entries to enable its automatic execution at every system startup.It attempts to steal sensitive online banking information, such as user names and password...
This spyware may be dropped by other malware.It creates folders where it drops its files.It attempts to steal sensitive online banking information, such as user names and passwords. This routine risks the exposure of the user's account information, ...
This spyware attempts to steal sensitive online banking information, such as user names and passwords. This routine risks the exposure of the user's account information, which may then lead to the unauthorized use of the stolen data. Once users acce...
It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It adds registry entries to enable its automatic execution at every system startup.It attempts to steal sensitive onl...
This malicious DLL file connects to command and control (C&C) servers and sends an HTTP GET request.It performs backdoor routines. Specifically, it steals and clears cookies. It downloads and executes files from the server. It reboots the system. It ...
Multiple unspecified vulnerabilities in Oracle Database 9.0.1.5 , 9.2.0.8, 9.2.0.8DV, 10.1.0.5, and 10.2.0.3 allows remote authenticated users to have an unknown impact via (1) SYS.DBMS_DRS in the D...
Exploits take advantage of vulnerabilities or security holes. Exploits are often incorporated into malware, which are consequently able to propagate into and run intricate routines on vulnerable machines to gain unauthorized access.
This hacking tool may arrive bundled with malware packages as a malware component. It may be manually installed by a user.
This hacking tool may arrive bundled with malware packages as a malware component. It may be manually installed by a user.
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users.
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users.
This spyware is also known as ChewBacca.This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It attempts to steal sensitive online banking information, such as...
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It attempts to steal sensitive online banking information, such as user names and passwords. This routine ...
This Trojan may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites.It attempts to steal sensitive online banking information, such as user names and passwords. This routine risks the exposure of...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It attempts to steal sensitive online banking information, such as user names and passwords. This routine r...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It attempts to steal sensitive online banking information, such as user names and passwords. This routine r...
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It attempts to steal sensitive online banking information, such as user names and passwords. This routine ...
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users.
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users.