Virus Calendar - Úvod  2019  2018  2017  2016  2015  2014  Bankovní  Databáze  Mobil  Ransom  Znalosti  Programy  Virus Calendar 

Úvod  2018  2017  2016  2015  2014  2013  2012  2011  2010  2009  2008

 

2019

Datum

Název

Info 

12.2.19 Hacktool.Modlishka Hacktool.Modlishka is a tool that is used to perform operations such as injecting and ending processes on the computer.
12.2.19 Backdoor.Scuoter Backdoor.Scuoter is a Trojan horse that opens a backdoor on the compromised computer.
12.2.19 Downloader.Keapot Downloader.Keapot is a Trojan horse that may download potentially malicious files onto and steal information from the compromised computer.
7.2.19 Ransom.Gogalocker Ransom.Gogalocker is a Trojan horse that encrypts files on the compromised computer and demands a payment to decrypt them.
5.2.19 Linux.Speakup Linux.Speakup is a Trojan horse that opens a backdoor on the compromised computer.

1.2.19

Trojan.Formbook

Trojan.Formbook is a Trojan horse that steals information from the compromised computer.

1.2.19

Backdoor.Chafpe

Backdoor.Chafpe is a Trojan horse that opens a backdoor on the compromised computer.

1.2.19

Backdoor.Chafanty

Backdoor.Chafanty is a Trojan horse that opens a backdoor on the compromised computer.

1.2.19

Backdoor.Chafty

Backdoor.Chafty is a Trojan horse that opens a backdoor on the compromised computer.

1.2.19

Backdoor.Chafpy

Backdoor.Chafpy is a Trojan horse that opens a backdoor on the compromised computer.

29.1.19

Trojan.Vcrodat

Trojan.Vcrodat is a Trojan horse that may perform malicious activities on the compromised computer.

29.1.19

Ransom.Anatova

Ransom.Anatova is a Trojan horse that encrypts files on the compromised computer and demands a payment to decrypt them.

29.1.19

Backdoor.Kirihop

Backdoor.Kirihop is a Trojan horse that opens a backdoor on the compromised computer.

28.1.19

Ransom.Pots

Ransom.Pots is a Trojan horse that encrypts files on the compromised computer and demands a payment to decrypt them.

24.1.19

Backdoor.Exemyr

Backdoor.Exemyr is a Trojan horse that opens a backdoor on the compromised computer.

23.1.19

Trojan.Cartbat

Trojan.Cartbat is a Trojan horse that downloads potentially malicious files onto the compromised computer.

19.1.19

Ransom.Mongolock

Ransom.MongoLock is a Trojan horse that deletes files from the compromised computer and then demands a payment for their return.

19.1.19

Bloodhound.RTF.15

Bloodhound.RTF.15 is a heuristic detection used to detect threats associated with the Trojan.Mdropper family of threats.

19.1.19

Bloodhound.RTF.16

Bloodhound.RTF.16 is a heuristic detection used to detect threats associated with the Trojan.Mdropper family of threats.

19.1.19

Bloodhound.RTF.17

Bloodhound.RTF.17 is a heuristic detection used to detect threats associated with the Trojan.Mdropper family of threats.

19.1.19

Bloodhound.RTF.18

Bloodhound.RTF.18 is a heuristic detection used to detect threats associated with the Trojan.Mdropper family of threats.

16.1.19

Linux.Ekcorminer

Linux.Ekcorminer is a Trojan horse that uses the compromised computer's resources to mine cryptocurrency.

15.1.19

Bloodhound.RTF.14

Bloodhound.RTF.14 is a heuristic detection used to detect threats associated with the Trojan.Mdropper family of threats.

15.1.19

Bloodhound.RTF.13

Bloodhound.RTF.13 is a heuristic detection used to detect threats associated with the Trojan.Mdropper family of threats.

14.1.19

Infostealer.Vidar

Infostealer.Vidar is a Trojan horse that steals information from the compromised computer.

14.1.19

Trojan.Liroxod

Trojan.Liroxod is a Trojan horse that opens a backdoor on the compromised computer. It may also download potentially malicious files.

9.1.2019 Exp.CVE-2019-0566 Exp.CVE-2019-0566 is a heuristic detection for files attempting to exploit the Microsoft Edge Remote Privilege Escalation Vulnerability (CVE-2019-0566).
9.1.2019 Exp.CVE-2019-0569 Exp.CVE-2019-0569 is a heuristic detection for files attempting to exploit the Microsoft Windows Kernel Local Information Disclosure Vulnerability (CVE-2019-0569).
4.1.2019 OSX.Windtail OSX.Windtail is a Trojan horse that downloads potentially malicious files and may perform malicious activities on the compromised computer.
4.1.2019 W64.Flobal W64.Flobal is a Trojan horse that opens a backdoor on the compromised computer and steals information.
3.1.2019 Downloader.Jumpta Downloader.Jumpta is a Trojan horse that downloads potentially malicious files onto the compromised computer.
1.1.2019 Trojan.Zleloa Trojan.Zleloa is a Trojan horse that may perform malicious activities on the compromised computer.