Keyword: tspy_lineage
15224 Total Search   |   Showing Results : 1281 - 1300
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be manually installed by a user. It uses common
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It attempts to steal sensitive online banking
This spyware may arrive in a system as dd800s.exe. It searches and installs a component file. It does not continue with its routine if it does not exists. This spyware may be downloaded by other
This spyware may be dropped by other malware. It opens a hidden instance of Internet Explorer to send stolen information to a certain site. It logs a user's keystrokes to steal information. Arrival
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It requires its main component to successfully perform
This spyware logs a user's keystrokes to steal information. It requires its main component to successfully perform its intended routine. Information Theft This spyware logs a user's keystrokes to
This spyware arrives as attachment to mass-mailed email messages. It modifies the Internet Explorer Zone Settings. It deletes the initially executed copy of itself. Arrival Details This spyware
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It opens a hidden Internet Explorer window. Arrival
This spyware may be downloaded by other malware/grayware from remote sites. It logs a user's keystrokes to steal information. Arrival Details This spyware may be downloaded by the following
This spyware may be dropped by other malware. It steals sensitive information such as user names and passwords, particularly for certain games. Stolen information may be used for profit by
This spyware may be dropped by other malware. It arrives as a component bundled with malware/grayware packages. It exports functions used by other malware. It requires its main component to
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
This spyware injects a remote thread to all running processes except certain processes. It sends certain system information to its C&C server. It hooks APIs to aid in its malicious routines. It is
This spyware may perform webinjects and steal user information such as user names and passwords when the user visits certain banking sites and/or financial institutions. It may also capture
SpyEye is a known malware family that steals sensitive information from affected systems. To get a one-glance comprehensive view of the behavior of this Spyware, refer to the Threat Diagram shown
This is the Trend Micro detection for a SpyEye component called "webinjects.txt". This spyware arrives as a component bundled with malware/grayware packages. Arrival Details This spyware arrives as a
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. As of this writing, the said sites are inaccessible.
This spyware arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It is injected into all running processes to remain memory resident. Arrival Details This
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a