Keyword: unauthorized file encryption
92237 Total Search   |   Showing Results : 1321 - 1340
passwords. This routine risks the exposure of the user's account information, which may then lead to the unauthorized use of the stolen data. Arrival Details This spyware may be downloaded by other
which may then lead to the unauthorized use of the stolen data. It accesses the following site to download its configuration file: http://{random}/news/?s={random numbers} The downloaded file contains
passwords. This routine risks the exposure of the user's account information, which may then lead to the unauthorized use of the stolen data. Arrival Details This spyware arrives as an attachment to email
unauthorized use of the stolen data. Once users access any of the monitored sites, it starts logging keystrokes. It attempts to steal information, such as user names and passwords, used when logging into certain
the user's account information, which may then lead to the unauthorized use of the stolen data. It attempts to steal information, such as user names and passwords, used when logging into certain banking
unauthorized use of the stolen data. Once users access any of the monitored sites, it starts logging keystrokes. Infection Points This Trojan arrives as a file downloaded from the following URLs: http://{BLOCKED
unauthorized use of the stolen data. It attempts to steal information, such as user names and passwords, used when logging into certain banking or finance-related websites. Arrival Details This Trojan may be
unauthorized use of the stolen data. It attempts to steal information, such as user names and passwords, used when logging into certain banking or finance-related websites. It attempts to get information from a
unauthorized use of the stolen data. Once users access any of the monitored sites, it starts logging keystrokes. It attempts to steal information, such as user names and passwords, used when logging into certain
the user's account information, which may then lead to the unauthorized use of the stolen data. It attempts to steal information, such as user names and passwords, used when logging into certain banking
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be dropped by other malware. It uses Windows
may then lead to the unauthorized use of the stolen data. It steals certain information from the system and/or the user. Arrival Details This Trojan Spy arrives on a system as a file dropped by other
opens the dropped document file containing a fake error message in Russian language stating that it requires a newer Word version to open the said document: After its encryption routine, it opens the
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Ransomware arrives on a system
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It encrypts files with specific file extensions. It
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies the Internet Explorer Zone Settings. It
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops files as ransom note. Arrival Details This
drives -noencrypt →Initialize but it wont proceed with its encryption routine -virtual → Ransomware Routine This Ransomware avoids encrypting files with the following strings in their file name: .exe .dll
startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run {GUID} = "{Malware Path}\{Malware File Name}" → deleted after successful encryption HKEY_CURRENT_USER\Software\Microsoft\ Windows
and chooses to install the offered jailbreak ( JailbreakMe 3 ) via the iOS device's Safari browser. As a result, the user is allowed to install unauthorized applications on the iOS device. Trojan.Gen.2