Keyword: usojan.macos.slisp.a
99333 Total Search   |   Showing Results : 21 - 40
This malware uses new technique for its data stealing routine which is utilizing the audio functionality of Mac. It also uses kernel extension as its rootkit component. To get a one-glance
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Ransomware arrives on a system
This OSX malware was used in the targeted attack campaign named Careto. The attack was noted for encoding its configuration data and encrypting its network traffic. To get a one-glance comprehensive
This is the Trend Micro generic detection for files exhibiting suspicious behavior that may cause harm to systems. Trojans are a general malware classification for malicious files, applications, or
This adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This adware arrives on a system as a
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Ransomware arrives on a system
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Ransomware arrives on a system
Upon execution, this malware prompts the installation of fake antivirus application. Once installed, it may download and install the fake antivirus/antispyware software, MacShield from a certain URL.
vulnerabilities used by Browser Exploitation Framework (BeEF). When loaded on a page, it parses all the link and forms to check if it is vulnerable to XSS attacks. It only runs on MacOS environment JS.BeEF (IKARUS)
6.0 SP6 allows remote attackers to execute arbitrary code via a crafted script request. Microsoft Visual Basic 6.0,Microsoft office macos Trend Micro Deep Security shields networks through Deep Packet
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be manually installed by a user. Arrival Details
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user
This backdoor enables the attacker to steal a range of information, including screenshots, audio, and keylogs. It can also execute commands and communicate using encrypted data. To get a one-glance
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be manually installed
This backdoor connects to specific IRC server and joins a particular IRC channel. It is capable of receiving and executing specific commands from the IRC server. This backdoor arrives on a system as
This malware is noteworthy due to its involvement in targeted attacks against organizations. To get a one-glance comprehensive view of the behavior of this Backdoor, refer to the Threat Diagram shown
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be manually installed
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies the affected system's HOSTS files. This