Skip to main content
Skip to main content
Microsoft Security Intelligence
49 entries found. Displaying page 1 of 3.
Updated on Apr 11, 2011
Win32/Cycbot is a backdoor trojan that allows attackers unauthorized access and control of an affected computer. After a computer is infected, the trojan connects to a specific remote server to receive commands from attackers. The commands may include instructing the trojan to update itself, visit web links, or download and execute arbitrary files. The trojan may also allow attackers to perform other backdoor functions, such as launching denial of service (DoS) attacks and retrieving system information from infected computers.
Alert level: severe
Updated on Apr 26, 2011
Alert level: severe
Updated on Jun 23, 2011
Alert level: severe
Updated on Mar 29, 2012
Backdoor:Win32/Cycbot.I is a backdoor trojan that allows attackers unauthorized access and control of an affected computer. After a computer is infected, the trojan connects to a specific IRC server and joins a specific channel to receive commands from attackers. Commands can instruct the trojan to spread to other computers by scanning for network shares with weak passwords, exploiting Windows vulnerabilities, or possibly spreading through backdoor ports opened by other families of malicious software. The trojan may also allow attackers to perform other backdoor functions, such as launching denial of service (DoS) attacks and retrieving system information from infected computers.
Alert level: severe
Updated on Apr 11, 2011
Backdoor:Win32/Cycbot.A is a backdoor trojan that allows attackers unauthorized access and control of an affected computer. After a computer is infected, the trojan connects to a specific remote server to receive commands from attackers. Commands can instruct the trojan to spread to other computers by scanning for network shares with weak passwords, exploiting Windows vulnerabilities, or possibly spreading through backdoor ports opened by other families of malicious software. The trojan may also allow attackers to perform other backdoor functions, such as launching denial of service (DoS) attacks and retrieving system information from infected computers.
Alert level: severe
Updated on Apr 11, 2011
Backdoor:Win32/Cycbot.D is a backdoor trojan that allows attackers unauthorized access and control of an affected computer. After a computer is infected, the trojan connects to a specific remote server to receive commands from attackers. Commands can instruct the trojan to spread to other computers by scanning for network shares with weak passwords, exploiting Windows vulnerabilities, or possibly spreading through backdoor ports opened by other families of malicious software. The trojan may also allow attackers to perform other backdoor functions, such as launching denial of service (DoS) attacks and retrieving system information from infected computers.
Alert level: severe
Updated on Apr 11, 2011
Backdoor:Win32/Cycbot.B is a backdoor trojan that allows attackers unauthorized access and control of an affected computer. After a computer is infected, the trojan connects to a specific remote server to receive commands from attackers. The commands may include instructing the trojan to update itself, visit web links, or download and execute arbitrary files.
Alert level: severe
Updated on Sep 15, 2011

Backdoor:Win32/Cybot.gen!cfg is the detection for a non-executable component created by members of the Backdoor:Win32/Cycbot malware family.

Alert level: severe
Updated on Oct 26, 2011
Backdoor:Win32/Cycbot.G is a backdoor trojan that allows attackers unauthorized access and control of an affected computer. After a computer is infected, the trojan connects to a specific IRC server and joins a specific channel to receive commands from attackers. Commands can instruct the trojan to spread to other computers by scanning for network shares with weak passwords, exploiting Windows vulnerabilities, or possibly spreading through backdoor ports opened by other families of malicious software. The trojan may also allow attackers to perform other backdoor functions, such as launching denial of service (DoS) attacks and retrieving system information from infected computers.
Alert level: severe
Updated on Aug 13, 2021
Alert level: severe
Updated on Feb 22, 2018
Alert level: severe
Updated on May 10, 2022
Alert level: severe
Updated on Feb 05, 2012
Alert level: severe
Updated on Feb 06, 2011
Alert level: severe
Updated on Mar 04, 2015
Alert level: severe
Updated on Oct 14, 2011
Alert level: severe
Updated on Dec 08, 2023
Alert level: severe
Updated on Sep 01, 2021
Alert level: severe
Updated on Oct 14, 2011
Alert level: severe
Updated on Mar 14, 2018
Alert level: severe