Keyword: unauthorized file encryption
92510 Total Search   |   Showing Results : 101 - 120
CVE-2011-0091,MS11-013 Kerberos in Microsoft Windows Server 2008 R2 and Windows 7 does not prevent a session from changing from strong encryption to DES encryption, which allows man-in-the-middle
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Ransomware arrives on a system
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It encrypts files found in specific folders. Arrival
bin before encryption Ransomware Routine This Ransomware avoids encrypting files with the following strings in their file path: #recycle $Recycle.Bin All Users AppData autorun.inf Boot boot.ini
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It attempts to steal sensitive online banking
following: This Ransomware displays its encryption progress in console. It encrypts files found in the following drives: Fixed Drives Removable Drives Network Share Drives It checks if the file it tries to
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It is capable of encrypting files in the affected
following processes if found running in the affected system's memory: calc.exe Dropping Routine This Ransomware drops the following files: {Encrypted File Path}\note.txt - contains encryption key Other
information, which may then lead to the unauthorized use of the stolen data. It connects to certain websites to send and receive information. It requires its main component to successfully perform its intended
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It encrypts files with specific file extensions. It
Description Name: RC4 Encryption in Pre-Authentication - Kerberos (Request) . This is Trend Micro detection for packets passing through KERBEROS network protocols that manifests unusual behavior which can be a potential intrusion. Below are some indi...
Description Name: Possible Encryption Downgrade Attack - Kerberos (Response) . This is Trend Micro detection for packets passing through KERBEROS network protocols that manifests unusual behavior which can be a potential intrusion. Below are some ind...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies the Internet Explorer Zone Settings. It
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops files as ransom note. It avoids encrypting
This Hacking Tool arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Hacking Tool arrives on a
This Trojan may allow unauthorized calls using RAS (Remote Access Service) on the affected machine. It may also set the affected machine to automatically dial certain numbers. This Trojan may be
the unauthorized use of the stolen data. Arrival Details It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Autostart
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It attempts to steal sensitive online banking
information, which may then lead to the unauthorized use of the stolen data. It connects to certain websites to send and receive information. It requires its main component to successfully perform its intended
Installation This Ransomware drops the following files: {Malware File Path}\{Malware Name}.exe.log {Encrypted directory}\README_TO_DECRYPT.html %User Temp%\{8 Random Characters}.bat → deleted after encryption