Skip to main content
Skip to main content
Microsoft Security Intelligence
500 entries found. Displaying page 1 of 25.
Updated on Apr 11, 2011
TrojanDropper:Win32/Zegost.B is a trojan that drops and installs Backdoor:Win32/Zegost.F and changes registry data to load the dropped malware as a service.
Alert level: severe
Updated on Jul 02, 2012

Backdoor:Win32/Zegost.AD is malware that drops a backdoor trojan in your computer. The backdoor trojan is detected as Backdoor:Win32/Zegost.X.

Alert level: severe
Updated on Apr 11, 2005
Backdoor:Win32/Berbew.AO is a backdoor Trojan that targets computers running Microsoft Windows 2000 or Windows XP. The Trojan is downloaded to a computer by another downloader Trojan that is sent by e-mail. Backdoor:Win32/Berbew.AO retrieves locally cached passwords and sends them to a Web site. It also opens certain TCP ports.
Alert level: severe
Updated on Apr 28, 2005
Backdoor:Win32/Hackdef.W is a backdoor Trojan that is distributed in various ways to computers running certain versions of Microsoft Windows. This Trojan is a user-mode rootkit. It creates, alters, and hides Windows system resources and can hide proxy services and backdoor functionality. It can also conceal use of TCP and UDP ports for receiving commands from attackers.
Alert level: severe
Updated on May 09, 2005
This software threat is detected and removed by the Malicious Software Removal Tool. For more information, see the parent variant.
Alert level: severe
Updated on Jun 28, 2005
Backdoor:Win32/Hackdef.K is a backdoor Trojan that is distributed in various ways to computers running certain versions of Microsoft Windows. This Trojan is a user-mode rootkit that creates, alters, and hides Windows system resources on an infected computer, and can hide proxy services and backdoor functionality. It can also conceal use of TCP and UDP ports for receiving commands from attackers.
Alert level: severe
Updated on Jun 29, 2005
This software threat is detected and removed by the Malicious Software Removal Tool. For more information, see the parent variant.
Alert level: severe
Updated on Jun 29, 2005
This software threat is detected and removed by the Malicious Software Removal Tool. For more information, see the parent variant.
Alert level: severe
Updated on Oct 20, 2005
Backdoor:Win32/Rbot.LY is a backdoor Trojan that targets computers running certain versions of Microsoft Windows. The Trojan drops VirTool:WinNT/FURootkit.D, a kernel-mode rootkit that hides running processes. The Trojan also connects to an IRC server to receive commands from attackers. This can include commands to spread to network shares as well as computers with unpatched Windows vulnerabilities.
Alert level: severe
Updated on Oct 28, 2005
Backdoor:Win32/Rbot.DZ is a backdoor Trojan that targets computers running certain versions of Microsoft Windows. The Trojan can spread by copying itself to network shares and by exploiting the Windows vulnerabilities described in Microsoft Security Bulletins MS03-26 and MS04-011. The Trojan connects to an IRC server from an infected computer to receive commands from attackers.
Alert level: severe
Updated on May 04, 2007
Backdoor:Win32/Haxdoor.IF is a backdoor Trojan that allows remote control of the machine over the Internet. The Trojan is rootkit-enabled, allowing it to hide processes and files related to the threat. Backdoor:Win32/Haxdoor.IF lowers security settings on the computer, gathers user and system information and sends it to a third party
Alert level: severe
Updated on Apr 11, 2011
Backdoor:Win32/Rbot.CA is a backdoor Trojan that connects to an IRC server to receive commands from remote attackers. Commands could include instructions to spread to other computers via open network shares or by exploit of a security vulnerability, or to launch a denial of service (DoS) attack against specified targets.
Alert level: severe
Updated on Apr 11, 2011
This dynamic-link library (DLL) file is dropped by variants of Backdoor:Win32/Berbew.
 
For more information, see Backdoor:Win32/Berbew elsewhere in the encyclopedia.
Alert level: severe
Updated on Jan 07, 2005
Backdoor:Win32/Berbew.T is a backdoor Trojan that downloads to a computer by another downloader Trojan that is sent through e-mail. Backdoor:Win32/Berbew.T retrieves locally cached passwords and sends them to a Web site. It also opens certain ports.
Alert level: severe
Updated on Jan 07, 2005
Backdoor:Win32/Berbew.Y is a backdoor Trojan that downloads to a computer by another downloader Trojan that is sent through e-mail. Backdoor:Win32/Berbew.Y retrieves locally cached passwords and sends them to a Web site. It also opens certain ports.
Alert level: severe
Updated on Jan 08, 2005
Backdoor:Win32/Gaobot.AU is a backdoor Trojan that can spread across network connections by breaking weak passwords or by exploiting vulnerabilities described in Microsoft Security Bulletins MS03-001, MS03-007, or MS03-026. After the Trojan copies and runs itself on a remote computer, it connects to an IRC server to receive commands.
Alert level: severe
Updated on Jan 10, 2005
Backdoor:Win32/Berbew.G is a Trojan that captures personal information and sends it to a Web site. It can also download and execute files from Web sites.
Alert level: severe
Updated on Apr 11, 2011
Backdoor:Win32/Rbot.AN is a backdoor Trojan that connects to an IRC server to receive commands from remote attackers. Commands could include instructions to spread to other computers via open network shares or by exploit of a security vulnerability, or to launch a denial of service (DoS) attack against specified targets.
Alert level: severe
Updated on Apr 11, 2011
Backdoor:Win32/Rbot.AY is a backdoor Trojan that connects to an IRC server to receive commands from remote attackers. Commands could include instructions to spread to other computers via open network shares or by exploit of a security vulnerability, or to launch a denial of service (DoS) attack against specified targets.
Alert level: severe
Updated on Apr 11, 2011
Backdoor:Win32/Rbot.BJ is a backdoor Trojan that connects to an IRC server to receive commands from remote attackers. Commands could include instructions to spread to other computers via open network shares or by exploit of a security vulnerability, or to launch a denial of service (DoS) attack against specified targets.
Alert level: severe