Keyword: tspy_lineage
15224 Total Search   |   Showing Results : 801 - 820
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It attempts to steal sensitive online banking
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes then deletes itself afterward. Arrival
This spyware may be dropped by other malware. It executes commands from a remote malicious user, effectively compromising the affected system. Arrival Details This spyware may be dropped by the
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes then deletes itself afterward. It creates
This spyware may be dropped by other malware. Arrival Details This spyware may be dropped by other malware. Autostart Technique This spyware modifies the following registry entry(ies) to enable its
This spyware may be dropped by other malware. It retrieves specific information from the affected system. It logs a user's keystrokes to steal information. It exports functions used by other malware.
This spyware arrives as a file that exports the functions of other malware/grayware. It may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It requires its main component to successfully perform
This spyware arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This spyware adds certain strings to the Windows HOSTS file. It hooks Windows API functions to make itself invisible in file searches. This spyware also has rootkit capabilities, which enables it to
This Trojan may be dropped by other malware. It exports functions used by other malware. It requires its main component to successfully perform its intended routine. Arrival Details This Trojan may
This spyware may be dropped by other malware. It executes then deletes itself afterward. Arrival Details This spyware may be dropped by the following malware: BKDR_SIMDA.SU Installation This spyware
This malware is designed specifically to steal sensitive information such as Personal Identification Numbers (PINs) from devices with PIN pads, such as ATMs. To get a one-glance comprehensive view of
This is the Trend Micro detection for certain SpyEye Toolkit plugins. NOTES: This is the Trend Micro detection for the following SpyEye Toolkit plugins: customconnector - tells the bot which command
This spyware also has rootkit capabilities, which enables it to hide its processes and files from the user. It lowers the security setting of Internet Explorer. Installation This spyware drops the
This is the Trend Micro detection for a SpyEye plugin called "email grabber". This spyware arrives as a component bundled with malware/grayware packages. Arrival Details This spyware arrives as a