Keyword: bkdrnetdevil12
102514 Total Search   |   Showing Results : 1621 - 1640
CVE-2012-1537 This patch addresses a vulnerability in Microsoft Windows, which could allow remote code execution thus compromising the security of the infected system. Remote attackers can exploit
CVE-2012-2549 This patch addresses a vulnerability in Microsoft Windows, which could bypass the security feature via a revoked certificate to an IP-HTTPS server used in Microsoft DirectAccess
CVE-2012-5612 Heap-based buffer overflow in Oracle MySQL 5.5.19 and other versions through 5.5.28, and MariaDB 5.5.28a and possibly other versions, allows remote authenticated users to cause a denial
Description Name: ZEUS - HTTP (Request) - Variant 12 . This is Trend Micro detection for packets passing through HTTP network protocols that can be used as Command and Control Communication. This also indicates a malware infection. Below are some ind...
Description Name: MDMBOT TCP Request - Class 2 . This is Trend Micro detection for packets passing through TCP network protocols that can be used as Command and Control Communication. This also indicates a malware infection. Below are some indicators...
Description Name: SCAR - HTTP (Request) . This is Trend Micro detection for packets passing through HTTP network protocols that can be used as Command and Control Communication. This also indicates a malware infection. Below are some indicators of an...
Description Name: JORIK - HTTP (Request) - Variant 2 . This is Trend Micro detection for packets passing through HTTP network protocols that can be used as Command and Control Communication. This also indicates a malware infection. Below are some ind...
Description Name: MEVADE SSH Request - Class 1 . This is Trend Micro detection for packets passing through PROTOCOL_20 network protocols that can be used as Command and Control Communication. This also indicates a malware infection. Below are some in...
Description Name: TROJAN - HTTP (Request) - Variant 36 . This is Trend Micro detection for packets passing through HTTP network protocols that can be used as Command and Control Communication. This also indicates a malware infection. Below are some i...
Description Name: BANKER - HTTP (Request) - Variant 12 . This is Trend Micro detection for packets passing through HTTP network protocols that can be used as Command and Control Communication. This also indicates a malware infection. Below are some i...
Description Name: FAKEINST - HTTP (Request) - Variant 2 . This is Trend Micro detection for packets passing through HTTP network protocols that can be used as Command and Control Communication. This also indicates a malware infection. Below are some ...
Description Name: Linux Reverse Shell - TCP (Response) . This is Trend Micro detection for TCP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting this type of network behavior...
This Ransomware may be dropped by other malware. Arrival Details This Ransomware may be dropped by the following malware: Ransom_Agent.R002C0OGU18 Stolen Information This Ransomware saves the stolen
Description Name: AGENT - HTTP (Request) - Variant 12 . This is Trend Micro detection for packets passing through HTTP network protocols that can be used as Command and Control Communication. This also indicates a malware infection. Below are some in...
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan Spy arrives on a system
This Worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It propagates via shared networks and drops copies of
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It encrypts files with specific file extensions. It
This Ransomware may be downloaded by other malware/grayware/spyware from remote sites. Arrival Details This Ransomware may be downloaded by other malware/grayware/spyware from remote sites. Stolen
This Ransomware may be downloaded by other malware/grayware/spyware from remote sites. Arrival Details This Ransomware may be downloaded by other malware/grayware/spyware from remote sites. Stolen
This Ransomware arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded