Malware - Úvod  2018  2017  2016  2015  2014  Bankovní  Databáze  Mobil  Ransom  Znalosti  Programy  Virus Calendar 

 

Datum

Název

Info 

14.12.18

Trojan.FileraseTrojan.Filerase is a Trojan horse that deletes files and folders on the compromised computer.

14.12.18

Backdoor.Cobalt

Backdoor.Cobalt is a Trojan horse that opens a backdoor on the compromised computer.

13.12.18

Exp.CVE-18-8611

Exp.CVE-18-8611 is a heuristic detection for files attempting to exploit the Microsoft Windows Kernel Local Privilege Escalation Vulnerability (CVE-18-8611).

11.12.18

Android.BankBot.495.origin

A Banking Trojan for Android mobile devices. Its main goal is to steal confidential data. Android.BankBot.495.origin was first detected on Google Play and attacked Brazilian users. The Trojan was distributed under the guise of applications intended for spying on the owners of mobile devices.

9.12.18

Win32/Rootkit.Agent.OCL

Win32/Rootkit.Agent.OCL is a trojan designed to deliver various malware to the user's systems. The file is run-time compressed using Enigma .

7.12.18

Exp.CVE-18-15982

Exp.CVE-18-15982 is a heuristic detection for files attempting to exploit the Adobe Flash Player Use After Free Remote Code Execution Vulnerability (CVE-18-15982).

7.12.18

Ransom.Wixido

Ransom.Wixido is a Trojan horse that encrypts files on the compromised computer and demands a payment to decrypt them.

5.12.18

Linux.Chalubo

Linux.Chalubo is a Trojan that may use the compromised computer to conduct distributed denial-of-service (DDoS) attacks.

2.12.18

Backdoor.Powemuddy

Backdoor.Powemuddy is a Trojan horse that opens a backdoor on the compromised computer. It may also download potentially malicious files.

29.11.18

Trojan.Click3.27430

A Trojan clicker, distributed under the guise of the DynDNS app from the website dnsip.ru in the archive Dyn-DNS-Setup-18_11_16_07.zip.

29.11.18

AndroidOS_FraudBot.OPS

Certain applications on Google Play pose as legitimate voice messenger platforms, with suspicious automated functions such as automatic pop-ups of fake surveys and fraudulent ad clicks.

29.11.18

TrojanSpy.Win32.TRICKBOT.AL

This Trojan Spy arrives as an attachment to email messages spammed by other malware/grayware or malicious users.

29.11.18

Worm.Win32.BLADABINDI.AA

This Worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It drops copies of itself into all the removable drives connected to an affected system.

29.11.18

BKDR_BINLODR.ZNFJ-A

This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

29.11.18

COINMINER.WIN32.MALXMR.TIAOODAM

This Coinminer arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

29.11.18

TrojanSpy.Win32.TRICKBOT.AK

This Trojan Spy arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

29.11.18

TSPY_TRICKBOT.THOIBEAI

This Trojan Spy steals certain information from the system and/or the user.It connects to certain websites to send and receive information.

29.11.18

Backdoor.Win32.REMCOS.TICOGBZ

This Backdoor arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

29.11.18

TROJANSPY.WIN32.GOLROTED.THAOOEAH

This Trojan Spy arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

29.11.18

Backdoor.Linux.SETAG.RPA

This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It executes commands from a remote malicious user, effectively compromising the affected system.

26.11.18

Linux.BtcMine.174

A multicomponent malware program capable of infecting Linux devices and intended to be used for Monero (XMR) mining. It is implemented as a shell script containing over 1,000 lines of code.

26.11.18

Android.Banker.2876

A Trojan for Android mobile devices, spreading under the guise of banking applications. Attackers use Firebase Realtime Database and Firebase Cloud Messaging to manage Android.Banker.2876 and transfer data

14.11.18

Ransom.Kraken

Ransom.Kraken is a Trojan horse that encrypts files on the compromised computer and demands a payment to decrypt them.

8.11.18

Trojan.Fastcash

Trojan.Fastcash is a Trojan horse that injects code into running processes on the compromised computer.

25.10.18

Trojan.Crobaruko

Trojan.Crobaruko is a Trojan horse that steals information from the compromised computer.

25.10.18

Win32/Agent.ZXC

Win32/Agent.ZXC is a trojan that can interfere with the operation of certain applications. The trojan blocks calls to certain numbers.

24.10.18

Hacktool.Posh

Hacktool.Posh is a tool that runs PowerShell scripts on the computer.

23.10.18

Win32/Braces.A

Win32/Braces.A serves as a backdoor. It can be controlled remotely.

19.10.18

Exp.CVE-18-8453

Exp.CVE-18-8453 is a heuristic detection for files attempting to exploit the Microsoft Windows Kernel 'Win32k.sys' Local Privilege Escalation Vulnerability (CVE-18-8453).

19.10.18

Infostealer.Azorult

Infostealer.Azorult is a Trojan horse that steals information from the compromised computer.

13.10.18

Trojan.Danabot.B

Trojan.Danabot.B is a Trojan horse that steals information from the compromised computer.

10.10.18

Trojan.Betabot.B

Trojan.Betabot.B is a Trojan horse that steals information from the compromised computer.

5.10.18

Heur.AdvML.JS.C

Heur.AdvML.JS.C is a heuristic detection designed to generically detect malicious files using advanced machine learning technology.

5.10.18

CL.Downloader

CL.Downloader is a threat that downloads potentially malicious files onto the compromised computer.

2.10.18

Trojan.Madominer

Trojan.Madominer is a worm that propagates by exploiting three vulnerabilities. It installs a coinminer. It may also download potentially malicious files.

2.10.18

Trojan.Lojax

Trojan.Lojax is a Trojan horse that may download potentially malicious files onto the compromised computer.

29.9.18

MSIL/Kryptik

MSIL/Kryptik is a generic detection of malicious obfuscated code within files with MSIL format.

29.9.18

MSIL/GenKryptik

MSIL/GenKryptik is a generic detection of malicious obfuscated code within files with MSIL format.

29.9.18

Trojan.Flawedammyy

Trojan.Flawedammyy is a Trojan horse that opens a backdoor and performs malicious actions on the compromised computer.

28.9.18

Coinminer.Unix.MALXMR.AA

This Coinminer arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

28.9.18

Trojan.JS.POWLOAD.AA

This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

22.9.18

Backdoor.SofacyX

Backdoor.SofacyX is a Trojan horse that opens a backdoor on the compromised computer.

22.9.18

Trojan.Loaderinit

Trojan.Loaderinit is a Trojan horse that loads and decrypts additional malware in the compromised computer's memory.