Malware - Úvod  2019  2018  2017  2016  2015  2014  Bankovní  Databáze  Mobil  Ransom  Znalosti  Programy  Virus Calendar 

 

2019

Datum

Název

Info 

24.1.19Backdoor.ExemyrBackdoor.Exemyr is a Trojan horse that opens a backdoor on the compromised computer.
23.1.19Trojan.CartbatTrojan.Cartbat is a Trojan horse that downloads potentially malicious files onto the compromised computer.
19.1.19Ransom.MongolockRansom.MongoLock is a Trojan horse that deletes files from the compromised computer and then demands a payment for their return.
19.1.19Bloodhound.RTF.15Bloodhound.RTF.15 is a heuristic detection used to detect threats associated with the Trojan.Mdropper family of threats.
19.1.19Bloodhound.RTF.16Bloodhound.RTF.16 is a heuristic detection used to detect threats associated with the Trojan.Mdropper family of threats.
19.1.19Bloodhound.RTF.17Bloodhound.RTF.17 is a heuristic detection used to detect threats associated with the Trojan.Mdropper family of threats.
19.1.19Bloodhound.RTF.18Bloodhound.RTF.18 is a heuristic detection used to detect threats associated with the Trojan.Mdropper family of threats.
16.1.19Linux.EkcorminerLinux.Ekcorminer is a Trojan horse that uses the compromised computer's resources to mine cryptocurrency.
15.1.19Bloodhound.RTF.14Bloodhound.RTF.14 is a heuristic detection used to detect threats associated with the Trojan.Mdropper family of threats.
15.1.19Bloodhound.RTF.13Bloodhound.RTF.13 is a heuristic detection used to detect threats associated with the Trojan.Mdropper family of threats.
14.1.19Infostealer.VidarInfostealer.Vidar is a Trojan horse that steals information from the compromised computer.
14.1.19Trojan.LiroxodTrojan.Liroxod is a Trojan horse that opens a backdoor on the compromised computer. It may also download potentially malicious files.
9.1.19Exp.CVE-2019-0566Exp.CVE-2019-0566 is a heuristic detection for files attempting to exploit the Microsoft Edge Remote Privilege Escalation Vulnerability (CVE-2019-0566).
9.1.19Exp.CVE-2019-0569Exp.CVE-2019-0569 is a heuristic detection for files attempting to exploit the Microsoft Windows Kernel Local Information Disclosure Vulnerability (CVE-2019-0569).
4.1.19OSX.WindtailOSX.Windtail is a Trojan horse that downloads potentially malicious files and may perform malicious activities on the compromised computer.
4.1.19W64.FlobalW64.Flobal is a Trojan horse that opens a backdoor on the compromised computer and steals information.
3.1.19Downloader.JumptaDownloader.Jumpta is a Trojan horse that downloads potentially malicious files onto the compromised computer.

1.1.19

Trojan.Zleloa

Trojan.Zleloa is a Trojan horse that may perform malicious activities on the compromised computer.