Keyword: OSX_LEAP.A
99885 Total Search   |   Showing Results : 41 - 60
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain websites to send and receive
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This proof of concept attempts to exploit a vulnerability known as Spectre. If successful, it allows exploitation of said vulnerability in Mac OS systems. Exploitation of said vulnerability is
This adware may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting
This backdoor may be dropped by other malware. It executes commands from a remote malicious user, effectively compromising the affected system. It connects to a website to send and receive
This Trojan arrives as a component bundled with malware/grayware packages. Arrival Details This Trojan arrives as a component bundled with malware/grayware packages. NOTES: This Trojan is a malicious
This adware may be downloaded by other malware/grayware/spyware from remote sites. It may be manually installed by a user. Arrival Details This adware may be downloaded by other
This Backdoor may be dropped by other malware. It executes commands from a remote malicious user, effectively compromising the affected system. It connects to a website to send and receive
This backdoor may be downloaded by other malware/grayware from remote sites. Arrival Details This backdoor may be downloaded by the following malware/grayware from remote sites: OSX_REVIR.A
This Backdoor executes commands from a remote malicious user, effectively compromising the affected system. Backdoor Routine This Backdoor executes the following commands from a remote malicious
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies the affected system's HOSTS files. This
This malware uses new technique for its data stealing routine which is utilizing the audio functionality of Mac. It also uses kernel extension as its rootkit component. To get a one-glance
this Backdoor, refer to the Threat Diagram shown below. This OSX malware has a Windows counterpart, which Trend Micro detected as BKDR_MUSMINIM.A. This is a remote administration tool (RAT) that has
This is the Trend Micro detection for torrent files which download a copy of OSX_COINMINE.A bundled within a legitimate application. This Trojan may be unknowingly downloaded by a user while visiting
This Trojan poses as a fake Flash Player installer package. Upon execution, it prompts the installation of a Flash Player application. It adds certain strings strings to "private/etc/hosts". This
This is a FAKEAV variant that targets Mac operating systems. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below. Upon execution,
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Ransomware arrives on a system
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Ransomware arrives on a system
This malware is noteworthy due to the increased potential for damage that it possesses. Specifically, it targets MAC OS. To get a one-glance comprehensive view of the behavior of this Trojan, refer
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a