dcsimg

Esecurityplanet.com Staff - Article Archives - Page 6

11/2: Trojan.Whitewell Opens Back Door on Hacked PC

November 2, 2009
Trojan.Whitewell is a Trojan horse that opens a back door on the compromised computer.
READ MORE

10/30: Win32/AntivirusPro2010.AX is Windows Malware

October 30, 2009
Win32/AntivirusPro2010.AX is malware that targets the Windows platform.
READ MORE

10/29: W32/Zbot-IP Worm Uses Forged IRS Messages

October 29, 2009
The ZBot family, also known as Zeus, steals information including banking details, credentials for social networking sites, email/FTP accounts and web form contents.
READ MORE

10/28: Trojan.Bredolab!gen3 Aims at Encrypted Files

October 28, 2009
Trojan.Bredolab!gen3 is a heuristic detection for files of the Trojan.Bredolab family that may have been obfuscated or encrypted in order to conceal themselves from antivirus software.
READ MORE

10/27: Trojan.Ransomlock.D Locks the Desktop

October 27, 2009
Trojan.Ransomlock.D is a Trojan horse that locks the desktop making the computer unusable. It then asks the user to purchase a license in order to restore access to the computer.
READ MORE

10/26: Packed.Generic.261 Aims at Encrypted Files

October 26, 2009
Packed.Generic.261 is a heuristic detection for files that may have been obfuscated or encrypted in order to conceal them from antivirus software.
READ MORE

10/23: Bloodhound.Exploit.283 Targets Known Vulnerability

October 23, 2009
Bloodhound.Exploit.283 is a heuristic detection for files attempting to exploit the Microsoft GDI+ CCITT G4 TIFF File Processing Memory Corruption Remote Code Execution Vulnerability.
READ MORE

10/22: Adware.TrueAds Displays Ads on PC

October 22, 2009
Adware.TrueAds is an adware program that installs itself as a Browser Helper Object and periodically displays advertisements on the computer.
READ MORE

10/21: Trojan.FakeAV!gen6 Targets Encrypted Files

October 21, 2009
Trojan.FakeAV!gen6 is a heuristic detection for files that may have been obfuscated or encrypted in order to conceal themselves from antivirus software.
READ MORE

10/20: VBS_PSYME.DMB Creates an MDAC Object

October 20, 2009
This malware creates a Microsoft Data Access Component (MDAC) object, then attempts to access a URL to download a file.
READ MORE

10/19: Bloodhound.Exploit.278 is Heuristic Detection

October 19, 2009
Bloodhound.Exploit.278 is a heuristic detection for files attempting to exploit the Microsoft GDI+ PNG File Integer Overflow Remote Code Execution Vulnerability.
READ MORE

10/16: Bloodhound.Exploit.277 is Heuristic Scheme

October 16, 2009
Bloodhound.Exploit.277 is a heuristic detection for files attempting to exploit the Microsoft GDI+ PNG File Processing Remote Code Execution Vulnerability (BID 36645).
READ MORE

10/16: Downloader.Ergrun Download Files to Hacked Computer

October 16, 2009
Downloader.Ergrun is a Trojan horse that may download files on to the compromised computer.
READ MORE

10/15: Troj/Agent-LGE is Spam-Driven Fake Anti-Virus

October 15, 2009
Troj/Agent-LGE is yet another take on spam-driven fake anti-virus infection techniques.
READ MORE

10/14: Bloodhound.Exploit.273 is Heuristic Detection

October 14, 2009
Bloodhound.Exploit.273 is a heuristic detection for files attempting to exploit the Microsoft GDI+ WMF File Processing Remote Code Execution Vulnerability.
READ MORE

10/14: Trojan.FakeAV!gen3 Targets Encrypted Files

October 14, 2009
Trojan.FakeAV!gen3 is a heuristic detection for files that may have been obfuscated or encrypted in order to conceal themselves from antivirus software.
READ MORE

10/13: Packed.Generic.258 Detects Encrypted Files

October 13, 2009
Packed.Generic.258 is a heuristic detection for files that may have been obfuscated or encrypted in order to conceal them from antivirus software.
READ MORE

10/12: SecurityTool Exaggerates Threats Reports

October 12, 2009
SecurityTool is a misleading application that may give exaggerated reports of threats on the computer.
READ MORE

10/12: Packed.Generic.257 Conceals from Antivirus Software

October 12, 2009
Packed.Generic.257 is a heuristic detection for files that may have been obfuscated or encrypted in order to conceal them from antivirus software.
READ MORE