Keyword: zlob variants
893 Total Search   |   Showing Results : 241 - 260
NOTES: This is the Trend Micro detection for suspicious files that manifest behavior and characteristics similar to WORM_PALEVO variants. WORM_PALEVO variants are known to propagate via peer-to-peer
archived, bundled file, or a specially-crafted document. The attachment invariably exploits a vulnerability in either Adobe Acrobat Reader or Microsoft Office . Earlier variants of PlugX have been spotted to
September 2014, it caught the security industry’s attention due to its ability to bypass SSL , a popular security measure for online banking websites. How does DYRE arrive into users’ systems? DYREZA variants
widespread use, JS downloaders are relatively easy to have multiple variants on a single attack, helping it evade detection. The surge of spam delivering FAREIT was observed in Europe, North America, Asia
Known as PETYA , this ransomware displays ransom notes at system startup and overwrites Master Boot Record (MBR). It also abuses the cloud storage service Dropbox for its arrival. Some PETYA variants
by WORM_DOWNAD variants W32.Downadup!autorun (Symantec); Win32.Worm.DownadupINF.Gen (BitDefender); Worm.Win32.AutoRun.gxk (Kaspersky) Dropped by other malware
First SYKIPOT variants were spotted in 2007. These backdoors are usually dropped by other malware exploiting vulnerabilities. SYKIPOT backdoors steal the following information, which it sends to its
WAPOMI (also known as SIMFECT) and its variants is a part of a Chinese bootkit named Guntior. It is said to target Chinese users only. It is used to gain control of the affected system and remove
view a PDF copy of his/her personal invoice. Under the guise of the links are ransomware-related URLs that can infect machines. Some variants of this spam also come with malicious HTML attachments.
connected to a remote URL to download other malicious files. How does this threat make money for its perpetrators? The other malicious files that TROJ_DLOADER.CUT may include FAKEAV variants that will
certain website asking for sensitive information, such as credit card numbers. Other Details This is the Trend Micro detection for: A group of FAKEAV variants Rogue Antivirus Routine This Trojan displays
HORSMY variants are backdoors that are capable of receiving commands from a malicious user. Also, this malware family has the capability to gather system information such as the following: Hostname
to the download of the following: variants of PE_RAMNIT NOTES: It does not have rootkit capabilities. It does not exploit any vulnerability. Downloaded from the Internet
This Trojan may be dropped by other malware. It automatically executes files when a user opens a drive. Arrival Details This Trojan may be dropped by the following malware: variants of WORM_PALEVO
banking sites. DORKBOT variants are capable of launching denial-of –service (DDoS) attacks. In order to do so, it accepts commands from its controller by connecting to and joining IRC chatrooms. Analysis
Malware belonging to the SASFIS family are known to be downloaded on systems while visiting sites that have been compromised using a particular exploit pack known as "Eleonore". SASFIS variants are
extensions. When installed onto affected systems, variants of the UNRUY malware family connect to several URLs that display intrusive and unwanted pop-up advertisements. Apart from serving ads, this malware
extensions. When installed onto affected systems, variants of the UNRUY malware family connect to several URLs that display intrusive and unwanted pop-up advertisements. Apart from serving ads, this malware
extensions. When installed onto affected systems, variants of the UNRUY malware family connect to several URLs that display intrusive and unwanted pop-up advertisements. Apart from serving ads, this malware
extensions. When installed onto affected systems, variants of the UNRUY malware family connect to several URLs that display intrusive and unwanted pop-up advertisements. Apart from serving ads, this malware