Keyword: bkdr_back.b
34089 Total Search   |   Showing Results : 561 - 580
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be manually installed by a user. Arrival Details
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
NetBIOS Name Service (NBNS) is a broadcast UDP protocol for name resolution commonly used in Windows environment. WPAD protocol falls back to NBNS when it can't resolve the IP of WPAD server with
Vulnerability Risk Rating: Important An elevation of privilege vulnerability exists in Microsoft Windows when Kerberos falls back to NT LAN Manager (NTLM) Authentication Protocol as the default authentication
CVE-2010-2751 The nsDocShell::OnRedirectStateChange function in docshell/base/nsDocShell.cpp in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, and SeaMonkey before 2.0.6, allows remote
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops files as ransom note. Arrival Details This
Ransomware Routine This Ransomware appends the following extension to the file name of the encrypted files: .Apollon865 It drops the following file(s) as ransom note: {Encrypted Directory}\HOW TO BACK YOUR
following extension to the file name of the encrypted files: .Hermes666 It drops the following file(s) as ransom note: {directory with encrypted files}\HOW TO BACK YOUR FILES.txt It leaves text files that
way back 2014. It is now distributed by spam email with fake payment receipts, invoices, and product quotation requests. The malware can access the machine through a security vulnerability, or via
back xchange ackup acronis sql enterprise sophos veeam acrsch antivirus bedbg dcagent epsecurity epupdate eraser esgshkernel fa_scheduler iisadmin imap4 mbam endpoint afee mcshield task mfemms mfevtp mms
7, and 8.) Process Termination This Ransomware terminates the following services if found on the affected system: back xchange ackup acronis sql enterprise sophos veeam acrsch antivirus bedbg dcagent
outdated copy of itself having the following strings on its filename: langs buffer user spooler tlb back rus browser org flg psec cyan err chapp dmi join started cat reset dmrc scan bang ripple page ijpn
Mass deface Adminer login (SQL Manager) Reset password Retrieve domains and users Jump server Grab configurations Use CGI Telnet v1.3 Back connect or bind port Bypass functions Delete log files View log
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops files as ransom note. Arrival Details This
ransom note: {directory with encrypted files}\HOW TO BACK YOUR FILES.txt It leaves text files that serve as ransom notes containing the following text: Trojan.Ransom.Maoloa.A (BitDefender);
terminate the service by the following command "net stop "{service name}" /y": vmcomp vmwp veeam back xchange ackup acronis sql enterprise sophos veeam acrsch antivirus antivirus bedbg dcagent epsecurity
%Program Files%\oracle %Program Files%\Microsoft SQL Server %Program Files%\Mysql %Program Files%\oracle \oracle \database \data \db \app\Administrator\oradata \mysql \mssql \back \backup \dbbackup
perform malicious routine when rm is called and will still execute the original rm in /usr/bin/rmm. It removes the immutable and append only properties of the following files and reverts it back after
having the following strings on its filename: langs buffer user spooler tlb back rus browser org flg psec cyan err chapp dmi join started cat reset dmrc scan bang ripple page ijpn cabinet dasmrc mgm body