Malware - Úvod  2018  2017  2016  2015  2014  Bankovní  Databáze  Mobil  Ransom  Viry znalosti  Programy  Virus Calendar 

 

Datum

Název

Info 

14.11.2018

Ransom.KrakenRansom.Kraken is a Trojan horse that encrypts files on the compromised computer and demands a payment to decrypt them.

8.11.2018

Trojan.Fastcash

Trojan.Fastcash is a Trojan horse that injects code into running processes on the compromised computer.

25.10.2018

Trojan.Crobaruko

Trojan.Crobaruko is a Trojan horse that steals information from the compromised computer.

25.10.2018

Win32/Agent.ZXC

Win32/Agent.ZXC is a trojan that can interfere with the operation of certain applications. The trojan blocks calls to certain numbers.

24.10.2018

Hacktool.Posh

Hacktool.Posh is a tool that runs PowerShell scripts on the computer.

23.10.2018

Win32/Braces.A

Win32/Braces.A serves as a backdoor. It can be controlled remotely.

19.10.2018

Exp.CVE-2018-8453

Exp.CVE-2018-8453 is a heuristic detection for files attempting to exploit the Microsoft Windows Kernel 'Win32k.sys' Local Privilege Escalation Vulnerability (CVE-2018-8453).

19.10.2018

Infostealer.Azorult

Infostealer.Azorult is a Trojan horse that steals information from the compromised computer.

13.10.2018

Trojan.Danabot.B

Trojan.Danabot.B is a Trojan horse that steals information from the compromised computer.

10.10.2018

Trojan.Betabot.B

Trojan.Betabot.B is a Trojan horse that steals information from the compromised computer.

5.10.2018

Heur.AdvML.JS.C

Heur.AdvML.JS.C is a heuristic detection designed to generically detect malicious files using advanced machine learning technology. A file detected by this detection name is deemed by Symantec to pose a risk to users and is therefore blocked from accessing the computer.

5.10.2018

CL.Downloader

CL.Downloader is a threat that downloads potentially malicious files onto the compromised computer.

2.10.2018

Trojan.Madominer

Trojan.Madominer is a worm that propagates by exploiting three vulnerabilities. It installs a coinminer. It may also download potentially malicious files.

2.10.2018

Trojan.Lojax

Trojan.Lojax is a Trojan horse that may download potentially malicious files onto the compromised computer.

29.9.2018

MSIL/Kryptik

MSIL/Kryptik is a generic detection of malicious obfuscated code within files with MSIL format.

29.9.2018

MSIL/GenKryptik

MSIL/GenKryptik is a generic detection of malicious obfuscated code within files with MSIL format.

29.9.2018

Trojan.Flawedammyy

Trojan.Flawedammyy is a Trojan horse that opens a backdoor and performs malicious actions on the compromised computer.

28.9.2018

Coinminer.Unix.MALXMR.AA

This Coinminer arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

28.9.2018

Trojan.JS.POWLOAD.AA

This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

22.9.2018

Backdoor.SofacyX

Backdoor.SofacyX is a Trojan horse that opens a backdoor on the compromised computer.

22.9.2018

Trojan.Loaderinit

Trojan.Loaderinit is a Trojan horse that loads and decrypts additional malware in the compromised computer's memory.