Keyword: possible
495 Total Search   |   Showing Results : 261 - 280
CVE-2009-1544 This elevation of privilege vulnerability in the Windows Worstation Service is due to a possible "Double Free" condition occurring in the service. Successful exploitation of this
Instant Messenger message that takes them to the attacker's website. It could also be possible to display specially crafted web content by using banner advertisements or by using other methods to deliver
'add_pseudoheader' Memory Exhaustion Denial Of Service (CVE-2017-14495) Database Oracle 1001832* - Oracle Database Server Possible Brute Force Attempt (ATT&CK T1110) FTP Server Common 1002413* - FTP Server Possible
security solution that can detect spam and prevent the download of any possible malicious files that may come with it.
of the recipient’s possible assistance in an unlawful tax refund activity. As such, the recipient’s CPA license can be revoked because of such involvement. The recipients must click on the link
following: Upon execution, this spyware displays the following window: When translated in English, it says: "For your safety, Itau is updating its iToken device to version 1.2 for possible imperfections in
has the following capabilities: It opens a hidden instance of iexplore.exe and connects to remote sites to download and execute possible malicious file(s). Injects a malicious VBScript to HTML files.
for a cluster of specially crafted .PDF files that exploits a vulnerability in Adobe Reader and Acrobat in order to download or drop the possible malicious file wpbt0.DLL . The download link depends on
to connect to the remote C&C server and sends packets depending on the argument received and waits for possible connection. It is capable of receiving arbitrary commands from a remote attacker that may
Other Details This Ransomware does the following: Contains several errors which causes the sample to not run properly Contains a possible C&C URL: http://{BLOCKED}tronicsfbd.com/cryptkey/add.php?
user opens the attachment? For this spam run, we found that there were two possible outcomes that depend on the attachment. Users who open the attachment may see instructions about enabling macros. The
Telnet Server 1002414* - Telnet Server Possible Brute Force Attempt (ATT&CK T1110) Web Application Common 1011790* - Open Web Analytics Remote Code Execution Vulnerability (CVE-2022-24637) 1011839 -
Telnet Server 1002414* - Telnet Server Possible Brute Force Attempt (ATT&CK T1110) Web Application Common 1011790* - Open Web Analytics Remote Code Execution Vulnerability (CVE-2022-24637) 1011839 -
Generic Malicious DNS Server Detection 1002657* - Identified Too Many DNS Responses Database MySQL 1005045* - MySQL Database Server Possible Login Brute Force Attempt (ATT&CK T1110) Database Oracle
possible malware infections. Another notable malware is TROJ_GORIADU.SMX, which TROJ_FKEPLAYR.CH executes to create TROJ_GORIADU.DRP. This Trojan is responsible for dropping four more malicious files on the
attachments, this can lead to possible phishing of recipient’s account details should they decide to purchase the said survival kit. Once again, users are advised to be wary against these types of threats.
rootable - Enumerates possible root exploits in the infected system socks5 - Set up SOCKSv5 protocol sendmail - Send an email to a target Perl/Shellbot (McAfee), Mal/PerlBot-A (Sophos) Downloaded from the
"Other Details" Section: After a successful access on the URLs, it will then show another window which will serve as the downloading of a possible unwanted file/software by the user:
There's also a possible error in code of malware Content of Ransom Note: Send an email at {BLOCKED}ChessDecrypt@macr2.com on how to decrypt your files Ransom:Win32/HiddenTear.gen(Microsoft);
* indicates a new version of an existing rule Deep Packet Inspection Rules: DCERPC Services 1010164 - Identified Possible Ransomware File Extension Create Activity Over Network Share 1010192* -