Keyword: OSX_LEAP.A
99481 Total Search   |   Showing Results : 121 - 140
WOLYX, or also known as ‘Olyx’, was first spotted in a package called PortalCurrent events-2009 July 5.rar , where the content suggests that it was extracted from Wikipedia community portal current
Description Name: OSX KeRanger DNS Connection detected . This is Trend Micro detection for packets passing through DNS network protocols that can be used as N/A. This also indicates a malware infection. Below are some indicators of an infected host:E...
OSX_PINTSIZED.ENV connects to this site to send and receive commands from a remote malicious user. This malware was involved in a zero-day Java vulnerability exploit attack in January 2013.
OSX_FLASHBCK.A may be downloaded from this site. This malware poses a Flash Player installer. It disables Xprotect , an antimalware system built in to recent releases of Mac OS X .
OSX_FLASHBCK.A may be downloaded from this site. This malware poses a Flash Player installer. It disables Xprotect , an antimalware system built in to recent releases of Mac OS X .
OSX_CARETO.A connects to this URL to send and receive commands from a remote malicious user.
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be unknowingly downloaded by a user while visiting malicious websites. Arrival
OSX_OLYX.EVL connects to this to send and receive information. This site was involved in a targeted attack campaign that uses Pro-Tibetan sentiments as social engineering ploy for the attackers to
OSX_FLASHBCK.A connects to this site to download additional installation and configuration files. As of this writing, the site is inaccessible
OSX_FLASHBCK.A connects to this site to download additional installation and configuration files. As of this writing, the site is inaccessible
OSX_FLASHBCK.DL accesses this site to download files, which it then executes. As a result, malicious routines of the downloaded files are exhibited on the affected system. As of this writing, the
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan Spy arrives on a system
This Worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Worm arrives on a system as a file
This Worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Worm arrives on a system as a file
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
This Worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Worm arrives on a system as a file
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder