Keyword: tspy_lineage
15224 Total Search   |   Showing Results : 301 - 320
This spyware may be downloaded by other malware/grayware from remote sites. It is injected into all running processes to remain memory resident. It modifies the Internet Explorer Zone Settings. As of
This spyware arrives as a file that exports the functions of other malware/grayware. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when
This spyware arrives as a file that exports the functions of other malware/grayware. It may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by
This malware component is related to the Punkey point-of-sale (PoS) malware, which was uncovered in April 2015. To get a one-glance comprehensive view of the behavior of this Spyware, refer to the
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It is injected into all running processes to remain
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain websites to send and receive
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes then deletes itself afterward. Arrival
This malware was found to be hosted on certain compromised South Korean websites. Aside from stealing credentials from specific online games, it also downloads a backdoor detected as BKDR_TENPEQ.SM.
This ZBOT variant was used in a spam run which takes advantage of the UK Tax Return deadline. The said spam message purports to come from HM Revenue and Customs in the UK and informs users of a
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It does not
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies the Internet Explorer Zone Settings. It
This spyware arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It does not have any backdoor routine. It deletes itself after execution. Arrival Details
This ZBOT variant drops a configuration file that contains a list of its targeted banks and other financial sites. It also steals information from different FTP sites and steals personal certificates
This spyware may be dropped by other malware. Arrival Details This spyware may be dropped by other malware. Autostart Technique This spyware registers itself as a system service to ensure its
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
This spyware may be dropped by other malware. It retrieves specific information from the affected system. Arrival Details This spyware may be dropped by the following malware: TROJ_MDROP.XXTWZ
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It logs a user's keystrokes to steal information.