Keyword: VBS_SMALL
4601 Total Search   |   Showing Results : 881 - 900
Recruitment Plan," to two small groups of RSA employees over a two-day period. One of the said employees retrieved the message from his Junk Mail folder and opened the attachment with the same file name as the
http://sjc1-te-cmsap1.sdi.trendnet.org/dumpImages/31122009122650.jpeg How does this threat get into users' systems? Spammed messages lure users into downloading an electronic game related to the 2009
http://sjc1-te-cmsap1.sdi.trendnet.org/dumpImages/206201065435.jpeg How do users get this Web threat? Systems get infected by various binaries once users visit any site injected with a malicious
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This Trojan may be dropped by other malware. It requires its main component to successfully perform its intended routine. Arrival Details This Trojan may be dropped by other malware. Autostart
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes registry entries, causing some applications and
spammed email messages. The spammed messages use fake news in its topics. In 2007, STORM malware paired up with a NUWAR variant to create an endless loop of infection. The loop starts with a SMALL malware
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It arrives as a component bundled with malware/grayware
the user as someone who takes enjoyment in hurting small animals. This routine could damage the user's reputation among his contacts. This Trojan may be manually installed by a user. Arrival Details
via spammed email messages. The spammed messages use fake news in its topics. In 2007, STORM malware paired up with a NUWAR variant to create an endless loop of infection. The loop starts with a SMALL
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a