Keyword: browser hijacker
4876 Total Search   |   Showing Results : 481 - 500
Internet Explorer Google Chrome Mozilla Firefox Other Details This Trojan Spy does the following: After gathering the browser credentials on the affected machine, TROJ_OLYMPICDESTROYER.A will use the stolen
It is capable of creating a file that can steal the any of following information: Clipboard Logs FTP Information Keylogs Screenshot Serial keys of some applications Web browser information It may
information: http://{BLOCKED}s.com NOTES: This is a browser extension for Google Chrome, which displays shopping and travel ads from DealPly. This also has access to your browsing history, bookmarks, and data on
users when visiting malicious sites. NOTES: This is browser extension in Chrome with a name such as Homegroup Task . The extension redirects web searches to websites esearchpage.com and esearchpage.org .
CVE-2008-2470 The InstallShield Update Service Agent ActiveX control in isusweb.dll allows remote attackers to cause a denial of service (memory corruption and browser crash) and possibly execute
vulnerabilities used by Browser Exploitation Framework (BeEF). When loaded on a page, it parses all the link and forms to check if it is vulnerable to XSS attacks. It only runs on MacOS environment JS.BeEF (IKARUS)
screenshots of browser activity backdoor routines (performing commands of remote malicious users) As more variants are discovered, so too does the number of behaviors that URSNIF adopts, which shows us that
Internet Explorer is used by adding the following registry keys: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects\{10E1725C-7237-41A9-954A-04DCCB1FD16C} Other
%Application Data%\Torch\User Data\Default\Extensions\chadpnoelefiijkagieoaghailkmhhmm\2.2 %Application Data%\Chromatic Browser %Application Data%\Chromatic Browser\User Data %Application Data%\Chromatic Browser
Arrival Details This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Web Browser Home Page and Search Page
Installation This Trojan executes then deletes itself afterward. Web Browser Home Page and Search Page Modification This Trojan modifies the Internet Explorer Zone Settings. Other Details This Trojan connects to
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects\{CE7C3CF0-4B15-11D1-ABED-709549C10000} Other System Modifications This Trojan adds the following registry keys as part of
}finder.com/warrior/gate.php?{parameters} Web Browser Home Page and Search Page Modification This Trojan modifies the Internet Explorer Zone Settings. Compromises system security, Modifies Internet Explorer Zone Settings
website and run when a user accesses the said website. NOTES: This Google Chrome Browser Extension Archive file (CRX file) contains the following files detected by Trend Micro as JS_KOOBFACE.AC:
make phone call, open rooted shell backdoor, record voice, steal emails and browser history, record user outgoing/incoming call and phone number. Via social networking sites Steals information
malicious sites. Web Browser Home Page and Search Page Modification This Trojan modifies the Internet Explorer Zone Settings. Other Details This Trojan connects to the following possibly malicious URL:
Installation This Trojan executes then deletes itself afterward. Web Browser Home Page and Search Page Modification This Trojan modifies the Internet Explorer Zone Settings. Other Details This Trojan connects to
Details This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Web Browser Home Page and Search Page Modification This
through command prompt Can perform BSOD Can open file from either link or disk Can rename, restart and uninstall its server executable Can access URL from Opera, Chrome, Mozilla or via default browser Build
malware or as a file downloaded unknowingly by users when visiting malicious sites. Web Browser Home Page and Search Page Modification This Trojan modifies the Internet Explorer Zone Settings. Other Details