Keyword: worm_bropia
11018 Total Search   |   Showing Results : 1821 - 1840
This worm may be downloaded by other malware/grayware/spyware from remote sites. It may be unknowingly downloaded by a user while visiting malicious websites. It executes then deletes itself
It monitors processes to steal user credentials. This worm arrives via removable drives. It may be downloaded by other malware/grayware/spyware from remote sites. It may be unknowingly downloaded by
This worm drops copies of itself in all removable drives. It drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the drives of an affected system. Installation
This worm drops copies of itself into all the removable drives connected to an affected system. It drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the
This worm arrives via removable drives. It may be downloaded by other malware/grayware/spyware from remote sites. It may be unknowingly downloaded by a user while visiting malicious websites. It
This worm arrives by connecting affected removable drives to a system. It drops copies of itself into all the removable drives connected to an affected system. It drops an AUTORUN.INF file to
It drops copies of itself into the shared folders of certain peer-to-peer (P2P) networks. It executes command(s) from a remote malicious user. This worm arrives via peer-to-peer (P2P) shares. It
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops copies of itself into all the removable drives
This worm arrives via removable drives. It may be downloaded by other malware/grayware/spyware from remote sites. It may be unknowingly downloaded by a user while visiting malicious websites. It
This worm arrives via removable drives. It arrives by accessing affected shared networks. It uses the default Windows folder icon to trick users into opening the file. Double-clicking the file
This worm arrives by connecting affected removable drives to a system. It drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the drives of an affected system.
This worm arrives by connecting affected removable drives to a system. It may be dropped by other malware. It drops an AUTORUN.INF file to automatically execute the copies it drops when a user
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops copies of itself
This worm drops copies of itself in all removable drives. It drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the drives of an affected system. It deletes
This worm drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the drives of an affected system. It connects to a website to send and receive information.
It sends messages that contain links to sites hosting remote copies of itself using specific instant-messaging (IM) applications. This worm arrives via removable drives. It may be dropped by other
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. However, as of this writing, the said sites are
It drops component files detected as BKDR_IRCFLOOD.CN and TROJ_LAMEWAR.VTG. This worm arrives as a component bundled with malware/grayware packages. It may be unknowingly downloaded by a user while
It receives commands from a remote malicious user via IRC. These commands are executed on the affected system. However, as of this writing, the said servers are inaccessible. This worm arrives via
This worm executes then deletes itself afterward. It modifies registry entries to hide files with System and Read-only attributes. It drops an AUTORUN.INF file to automatically execute the copies it