Keyword: usoj_hydraq.sma
358 Total Search   |   Showing Results : 1 - 20
   Next  
This Trojan has received attention from independent media sources and/or other security firms. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown
application vulnerability to download HYDRAQ variants onto infected computers. Awareness about the attacks that first manifested as targeted against individuals increased when the code used in them was made
This JavaScript has received attention from independent media sources and/or other security firms. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
follow, a successful attack can lead to data theft and/or loss and to other malware infections. The HYDRAQ a.k.a Aurora attack also broke out in January 2010 when Trend Micro received several reports and
http://SJC1-TE-CMSAP1.sdi.trendnet.org/dumpImages/112201193825.jpegThe Trend Micro 2011 Threat Predictions includes the growth of targeted attacks, and it seems like cybercriminals are already
recently surfaced at around the same time HYDRAQ was discovered. The widespread use of Adobe software, particularly Adobe PDF Reader, has led to increased concern. The attack leverages the CVE-2009-4324
It opens a random port and waits for commands from a malicious attacker. Once a connection is established, it may perform several actions. This backdoor may be downloaded by other
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This spyware is noteworthy due to its capability to hijack user session as a user is logged in target websites. It also sends the gathered information to the server in real-time. This allows the
This malware sends out spam e-mails with malicious links where other malware can be downloaded. This worm may be downloaded from remote sites by other malware. Arrival Details This worm may be
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies the user's Internet Explorer home page into a
This worm executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the affected system. Arrival Details This worm may arrive via network shares.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
It runs certain commands that it receives remotely from a malicious user. Doing this puts the affected computer and information found on the coomputer at greater risk. It gathers certain information
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a