Keyword: yahoo
357 Total Search   |   Showing Results : 121 - 140
The IRCBOT malware family uses Internet Relay Chat (IRC) to send and receive commands from a bot master that operates each specific variant. IRCBOT malware are known to propagate via removable drives using software vulnerabilities. IRCBOT also used i...
This spyware may be dropped by other malware. It arrives as a component bundled with malware/grayware packages.
This backdoor may be dropped by other malware.It executes commands from a remote malicious user, effectively compromising the affected system.
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This spyware may be dropped by other malware.It steals sensitive information such as user names and passwords related to certain games.
This Worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This worm arrives by connecting affected removable drives to a system. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It uses the Windows Task Scheduler to add a s...
This worm attempts to steal user credentials, such as user names and passwords, related to online games. It does this by monitoring processes/services in the memory that contains certain strings.It also steals Yahoo Japan credentials by monitoring c...
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It disables Task Manager, Registry Editor, and Folder Options.
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It disables Task Manager, Registry Editor, and Folder Options.
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It disables Task Manager, Registry Editor, and Folder Options.
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It disables Task Manager, Registry Editor, and Folder Options.
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It modifies files, disabling programs and applications from properly running. It disables Task Manager, Regis...
This spyware attempts to steal sensitive online banking information, such as user names and passwords. This routine risks the exposure of the user's account information, which may then lead to the unauthorized use of the stolen data. Once users acce...
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It disables Task Manager, Registry Editor, and Folder Options.
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It disables Task Manager, Registry Editor, and Folder Options.
This spyware attempts to steal sensitive online banking information, such as user names and passwords. This routine risks the exposure of the user's account information, which may then lead to the unauthorized use of the stolen data. Once users acce...
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It connects to certain websites to send and receive information.
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be dropped by other malware.It does not have any propagation routine.It does not have any backdoor...
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.