Keyword: worm_bropia
11018 Total Search   |   Showing Results : 61 - 80
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It creates folders where
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any backdoor routine. It does not have
This worm arrives by connecting affected removable drives to a system. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious
This worm arrives by connecting affected removable drives to a system. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious
This worm is an emerging toolkit seen in the black market. It has the potential to be the next hot botnet malware, similar to DORKBOT. To get a one-glance comprehensive view of the behavior of this
blog post Shylock Not the Lone Threat Targeting Skype This worm arrives as attachment to mass-mailed email messages. It arrives via removable drives. It connects to Internet Relay Chat (IRC) servers. It
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops an AUTORUN.INF
Trend Micro has flagged this worm as noteworthy due to the increased potential for damage, propagation, or both, that it possesses. Specifically, this worm is capable of monitoring bank-related sites
This worm may be downloaded from remote sites by other malware. It may arrive via peer-to-peer network shares. It may be downloaded unknowingly by a user when visiting malicious Web sites. It arrives
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
This worm arrives by connecting affected removable drives to a system. It arrives by accessing affected shared networks. It arrives on a system as a file dropped by other malware or as a file
This worm arrives by connecting affected removable drives to a system. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious
This worm poses as a font file and uses the LNK vulnerability to propagate. There has also been an increase in customer infection because of this malware. To get a one-glance comprehensive view of
This worm arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives via peer-to-peer (P2P) shares. It arrives via removable drives. It arrives on a
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It gathers target email addresses from the Windows Address
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It opens certain ports to access shared networks. It does
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm
This worm uses social engineering methods to lure users into performing certain actions that may, directly or indirectly, cause malicious routines to be performed. Specifically, it makes use of spam
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops an AUTORUN.INF