Keyword: tspy_lineage
15224 Total Search   |   Showing Results : 1301 - 1320
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. As of this writing, the said sites are inaccessible.
This spyware may also gather certain information from the affected system. This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when
This spyware arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be unknowingly downloaded by a user while visiting malicious websites. It does not
This ZeuS variant uses an encryption algorithm that enables it to evade antivirus solutions. To get a one-glance comprehensive view of the behavior of this Spyware, refer to the Threat Diagram shown
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It is injected into all running processes to remain
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It is injected into all running processes to remain
This spyware arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
This spyware arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
This spyware arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be unknowingly downloaded by a user while visiting malicious websites. It modifies
This spyware arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This spyware arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be unknowingly downloaded by a user while visiting malicious websites. It modifies
It creates certain registry entries that affect the Internet Settings of the affected system. It steals confidential information from the affected system, such as user credentials, passwords, and
This spyware may be dropped by other malware. It attempts to steal information, such as user names and passwords, used when logging into certain banking or finance-related websites. It connects to
This Trojan may be downloaded by other malware/grayware/spyware from remote sites. Arrival Details This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It may be
This spyware may be downloaded by other malware/grayware/spyware from remote sites. It may be dropped by other malware. Arrival Details This spyware may be downloaded by other
This spyware may be downloaded by other malware/grayware/spyware from remote sites. It may be dropped by other malware. Arrival Details This spyware may be downloaded by other
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It attempts to steal information, such as user names