Keyword: tspy_legmir
15195 Total Search   |   Showing Results : 101 - 120
http://SJC1-TE-CMSAP1.sdi.trendnet.org/dumpImages/14420116527.jpegJanuary is when most countries kick off the tax season, which makes it a favorite cybercriminal target to make money. Thanks to
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It encrypts the log files that contain the information
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It encrypts the log files that contain the information
http://SJC1-TE-CMSAP1.sdi.trendnet.org/dumpImages/0992011112239.png Variants of the AMBLER malware family steal information from affected systems. Trend Micro detected variants of this malware as
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It injects its dropped file/component to specific
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It attempts to steal sensitive online banking
This spyware may be dropped by other malware. Arrival Details This spyware may be dropped by the following malware: TSPY_DROPSKIM.D NOTES: It is saved in the system as follows: C:\DieBold\DLL
This spyware may be dropped by other malware. It deletes itself after execution. Arrival Details This spyware may be dropped by the following malware: TSPY_URSNIF.SM2 TSPY_URSNIF.SM20 This malware
This spyware arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
This spyware arrives as a component bundled with malware/grayware packages. It connects to certain websites to send and receive information. Arrival Details This spyware arrives as a component
This spyware arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It encrypts the log files that contain the information
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It encrypts the log files that contain the information
http://sjc1-te-cmsap1.sdi.trendnet.org/dumpImages/125201023923.jpeg Background of the Attack TSPY_ZBOT is the Trend Micro detection for malware related to what the industry dubs "ZeuS botnets." ZeuS
http://SJC1-TE-CMSAP1.sdi.trendnet.org/dumpImages/291020107118.jpeg TSPY_ZBOT is the Trend Micro detection for malware related to what the industry dubs "ZeuS botnets." ZeuS botnet, in fact, is a
This spyware may be downloaded by other malware/grayware from remote sites. It executes then deletes itself afterward. It executes commands from a remote malicious user, effectively compromising the
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes then deletes itself afterward. It modifies
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
This is the Trend Micro detection for encrypted configuration files of TSPY_SPYEYE malware. It contains a list of targeted sites such as banking sites, mail servers and social networking sites.