Keyword: tspy_lineage
15224 Total Search   |   Showing Results : 1021 - 1040
This spyware opens a random port to allow a remote user to connect to the affected system. Once a successful connection is established, the remote user executes commands on the affected system. It
This spyware may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It creates folders where it drops its files. It modifies the Internet
This spyware arrives as a file that exports the functions of other malware/grayware. It may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by
This spyware also has rootkit capabilities, which enables it to hide its processes and files from the user. Installation This spyware drops the following files: %System%\drivers\{8-randomchars}.sys
Installation This spyware drops the following files: %System%\svrwsc.exe - detected as TSPY_AXESPEC.D (Note: %System% is the Windows system folder, which is usually C:\Windows\System on Windows 98
This spyware may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It uses a convincing Graphical User Interface to make the users think that
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It attempts to steal sensitive online banking
This spyware logs a user's keystrokes to steal information. It requires its main component to successfully perform its intended routine. Information Theft This spyware logs a user's keystrokes to
This spyware may be unknowingly downloaded by a user while visiting malicious websites. It may be dropped by other malware. It executes then deletes itself afterward. The dropped file is injected in
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to a website to send and receive
This spyware may be downloaded by other malware/grayware/spyware from remote sites. It may be dropped by other malware. It connects to a website to send and receive information. It also has rootkit
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be downloaded by other malware/grayware/spyware from remote sites. It may be
This spyware attempts to steal sensitive online banking information, such as user names and passwords. This routine risks the exposure of the user's account information, which may then lead to the
This spyware may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It creates folders where it drops its files. It may be injected into
This spyware attempts to steal information, such as user names and passwords, used when logging into certain banking or finance-related websites. It checks for the presence of the following processes
Once users access any of the monitored sites, it starts logging keystrokes. It attempts to steal information, such as user names and passwords, used when logging into certain banking or
This spyware attempts to steal sensitive online banking information, such as user names and passwords. This routine risks the exposure of the user's account information, which may then lead to the
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It attempts to steal sensitive online banking
This spyware attempts to steal information, such as user names and passwords, used when logging into certain banking or finance-related websites. Arrival Details This spyware may be downloaded from
This spyware attempts to steal information, such as user names and passwords, used when logging into certain banking or finance-related websites. Arrival Details This spyware may be downloaded from