Skip to main content
Skip to main content
Microsoft Security Intelligence
500 entries found. Displaying page 1 of 25.
Updated on Apr 11, 2011
Backdoor:Win32/Rbot.CB is a backdoor Trojan that connects to an IRC server to receive commands from remote attackers. Commands could include instructions to spread to other computers via open network shares or by exploit of a security vulnerability, or to launch a denial of service (DoS) attack against specified targets.
Alert level: severe
Updated on Apr 11, 2011
Backdoor:Win32/Rbot.DO is a backdoor Trojan that connects to an IRC server to receive commands from remote attackers. Commands could include instructions to spread to other computers via open network shares or by exploit of a security vulnerability, or to launch a denial of service (DoS) attack against specified targets.
Alert level: severe
Updated on Apr 11, 2011
Backdoor:Win32/Rbot.EE is a backdoor Trojan that connects to an IRC server to receive commands from remote attackers. Commands could include instructions to spread to other computers via open network shares or by exploit of a security vulnerability, or to launch a denial of service (DoS) attack against specified targets.
 
Backdoor:Win32/Rbot.EE may be identified as Backdoor:Win32/Rbot!1939.
Alert level: severe
Updated on Apr 11, 2011
Backdoor:Win32/Rbot.ER is a backdoor Trojan that runs in the background, gathers software installation and computer configuration details, and connects to an IRC server to receive commands from remote attackers. Commands could include instructions to spread to other computers via open network shares or by exploit of a security vulnerability, or to launch a denial of service (DoS) attack against specified targets.
Alert level: severe
Updated on Apr 11, 2011
Backdoor:Win32/Rbot.ET is a backdoor Trojan that runs in the background, gathers software installation and computer configuration details, and connects to an IRC server to receive commands from remote attackers. Commands could include instructions to spread to other computers via open network shares or by exploit of a security vulnerability, or to launch a denial of service (DoS) attack against specified targets.
Alert level: severe
Updated on Feb 07, 2007
Win32/Optixpro.J is a backdoor trojan that allows an attacker to control the computer remotely. It can be configured by attackers to perform a variety of malicious actions on the infected computer.
Alert level: severe
Updated on Feb 07, 2007
Backdoor:Win32/Berbew.AZ is a backdoor Trojan that retrieves locally cached passwords and passwords from active windows, and sends those passwords to a remote website.. Backdoor:Win32/Berbew.AZ also opens and monitors TCP ports for incoming transmissions.
Alert level: severe
Updated on Oct 07, 2005
Backdoor:Win32/Sdbot.RY is a backdoor Trojan that targets computers running certain versions of Microsoft Windows. The Trojan can spread by copying itself to network shares with weak passwords. The Trojan connects to an IRC server to receive commands from attackers.
Alert level: severe
Updated on Oct 28, 2005
Win32/Optixpro.T is a backdoor Trojan that targets several versions of Microsoft Windows. The Trojan opens a backdoor that allows an attacker to control the computer remotely. It can be configured by attackers to perform a variety of malicious actions on the infected computer.
Alert level: severe
Updated on Feb 02, 2005
Backdoor:Win32/Gaobot.X is a backdoor Trojan that connects to an IRC server to receive commands. The Trojan can spread to other machines by exploiting the vulnerabilities described in Microsoft Security Bulletins MS03-001, MS03-007, or MS03-026. It can also spread to machines with weak passwords.
Alert level: severe
Updated on Apr 11, 2005
Backdoor:Win32/Berbew.AW is a Trojan that installs silently on computers running Microsoft Windows 2000 or Windows XP. It may download files from Web sites and run them on the target computer, and may gather and send personal information from an infected computer to a Web site.
Alert level: severe
Updated on May 04, 2005
This software threat is detected and removed by the Malicious Software Removal Tool. For more information, see the parent variant.
Alert level: severe
Updated on May 06, 2005
This software threat is detected and removed by the Malicious Software Removal Tool. For more information, see the parent variant.
Alert level: severe
Updated on May 16, 2005
This dynamic-link library (DLL) file is dropped by variants of Backdoor:Win32/Berbew. See the parent variant list for more information.
Alert level: severe
Updated on Jan 07, 2005
Backdoor:Win32/Berbew.M is a Trojan installs silently on your computer. It can capture and send personal information to a Web site. It can also download files from Web sites and run them on your computer. There are no readily apparent symptoms that indicate that your computer is infected with this Trojan.
Alert level: severe
Updated on Jan 08, 2005
Backdoor:Win32/Gaobot.AF is a backdoor Trojan that can spread across network connections by breaking weak passwords or by exploiting vulnerabilities described in Microsoft Security Bulletins MS03-001, MS03-007, or MS03-026. After the Trojan copies and runs itself on a remote computer, it connects to an IRC server to receive commands.
Alert level: severe
Updated on Apr 11, 2011
Backdoor:Win32/Sdbot.A is a backdoor Trojan that allows an attacker to take control of an infected computer. When a computer is infected, the Trojan connects to an Internet Relay Chat (IRC) server and joins a channel in order to receive commands from the controlling attacker. These commands can instruct the Trojan to perform a number of different actions.
Alert level: severe
Updated on Apr 11, 2011
Backdoor:Win32/Rbot.EH is a backdoor Trojan that connects to an IRC server to receive commands from remote attackers. Commands could include instructions to spread to other computers via open network shares or by exploit of a security vulnerability, or to launch a denial of service (DoS) attack against specified targets.
Alert level: severe
Updated on Apr 11, 2011
Backdoor:Win32/Rbot.FM is a backdoor Trojan that runs in the background, gathers software installation and computer configuration details, and connects to an IRC server to receive commands from remote attackers. Commands could include instructions to spread to other computers via open network shares or by exploit of a security vulnerability, or to launch a denial of service (DoS) attack against specified targets.
Alert level: severe
Updated on Apr 11, 2011
Backdoor:Win32/Tuesoy.A is a backdoor Trojan that may be dropped by TrojanDropper:Win32/Tuesoy.A.
 
TrojanDropper:Win32/Tuesoy.A exploits the vulnerability described in Microsoft Security Bulletin MS06-047.
Alert level: severe