Keyword: usoj_artief.edx
283 Total Search   |   Showing Results : 201 - 220
This backdoor may be dropped by other malware. It opens a hidden Internet Explorer window. It executes commands from a remote malicious user, effectively compromising the affected system. It deletes
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the files it drops, prompting the affected
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the dropped file(s). As a result, malicious routines of the dropped files are
Upon execution, this backdoor terminates certain processes. This backdoor may be dropped by other malware. It deletes itself after execution. Arrival Details This backdoor may be dropped by the
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be unknowingly downloaded by a user while visiting malicious websites. It executes
This Trojan takes advantage of an unknown vulnerability in a certain software to allow a remote malicious user or malware to download files on the affected machine. Other Details This Trojan takes
This backdoor arrives as a dropped malware. It is an Enfal/Lurid malware that has been used in other targeted attacks in the past. This backdoor's dropper, TROJ_ARTIEF.SDY, comes as a .DOC file
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. However, as of this writing, the said sites are
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. Arrival Details This Trojan arrives as an attachment to email messages spammed by other
The NetTraveler campaign is a series of malware spam attacks used against different companies and governmental institutions. Included in this list are the Tibetan/Uyghur activists. Recently, we
http://SJC1-TE-CMSAP1.sdi.trendnet.org/dumpImages/172201574529.jpeg Imagine a targeted attack that aims for financial profit rather than the typical stealing of enterprise’s “crown jewels” or
Just as the 2012 London Olympics draws near, so do cybercriminals continue to exploit it for their social engineering attacks. This spammed email, discovered by Trend Micro researchers, is no
http://SJC1-TE-CMSAP1.sdi.trendnet.org/dumpImages/041020125438.jpeg PlugX is a remote access tool (RAT) used in targeted attacks aimed toward government-related institutions and key industries. It
EXPL_ARTIEF.A connects to this URL to download BKDR_TURKOJAN.JF.
This backdoor may be dropped by other malware. It adds registry entries to enable its automatic execution at every system startup. It opens a hidden Internet Explorer window. Arrival Details This
This Trojan may be dropped by other malware. It executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the affected system. It connects to certain