Keyword: yahoo
830 Total Search   |   Showing Results : 361 - 380
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain websites to send and receive
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It uses Windows Task Scheduler to create a
This Trojan may be dropped by other malware. It does not have any propagation routine. It does not have any backdoor routine. It does not have any information-stealing capability. Arrival Details
This backdoor monitors Internet browser's activity and checks for certain strings of popular websites such as search engines and social networking sites to steal information. It acts as a proxy
This worm arrives by connecting affected removable drives to a system. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to a website to send and receive
This malware attempts to establish a connection with certain remote hosts. It downloads an updated copy of itself or other malicious files from the said servers by sending a HTTP GET request. It does
This spyware adds certain strings to the Windows HOSTS file. It hooks Windows API functions to make itself invisible in file searches. This spyware also has rootkit capabilities, which enables it to
This description is based on the compiled analysis of several variants of WORM_VBNA. Note that specific data such as file names and registry values may vary for each variant. This worm arrives by
This malware is noteworthy due to the increased potential for damage, propagation, or both, that it possesses. More specifically, this malicious script is used in what looks like a targeted attack
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
RUNAGRY is a backdoor containing typical backdoor capabilities like downloading arbitrary files and executing remote shell command. However, it focuses on advertisements for profit by installing
RUNAGRY is a backdoor containing typical backdoor capabilities like downloading arbitrary files and executing remote shell command. However, it focuses on advertisements for profit by installing
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This worm arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
RUSTOCK malware are mostly backdoors, Trojans, and rootkits that have been downloaded by other malware such as BREDOLAB and VIRUX . This arrival routine was observed in website compromises seen in
RUSTOCK malware are mostly backdoors, Trojans, and rootkits that have been downloaded by other malware such as BREDOLAB and VIRUX . This arrival routine was observed in website compromises seen in
RUSTOCK malware are mostly backdoors, Trojans, and rootkits that have been downloaded by other malware such as BREDOLAB and VIRUX . This arrival routine was observed in website compromises seen in