Keyword: linux
300 Total Search   |   Showing Results : 161 - 180
* indicates a new version of an existing rule Deep Packet Inspection Rules: DCERPC Services - Client 1004373* - Identified DLL Side Loading Attempt Over Network Share Web Application Common 1009496 - Microsoft Exchange Serve...
This backdoor executes commands from a remote malicious user, effectively compromising the affected system.
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It reads its configuration file that contains commands and data to be sent to a remote server. It requir...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
Linux/Unix NOTES: Upon execution, this malware searches for .ELF files in the current folder. It then infects files that have write permissions in that folder. The infected files increase by 1,411 bytes in size. Its code can be seen atta...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
* indicates a new version of an existing rule Deep Packet Inspection Rules: DCERPC Services 1011660* - Linux Kernel KSMBD Denial Of Service Vulnerability (CVE-2023-0210) Redis Server 1011555* - Redis Integer Overflow Vulnerabilit...
* indicates a new version of an existing rule Deep Packet Inspection Rules: Asterisk Manager Interface 1012231 - Identified Asterisk 'Originate' Action With 'SET' Application System Command Execution Directory Client LDAP 101...
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes then deletes itself afterward.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes then deletes itself afterward.
This Coinminer arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan may be hosted on a website and run when a user accesses the said website. However, as of this writing, the said sites are inaccessible.