Follow:

Search the malware encyclopedia

Search term =
Sorted by Relevance| Sort by Date
310 entries found | Page 1 of
Search results have been optimized and some results have been removed. View all results.



Win32/Rbot
Description:The Win32/Rbot family of backdoor Trojans targets certain versions of Microsoft Windows. After the Trojan infects a computer, it allows attackers to control the computer through an IRC channel. Some commands instruct Win32/Rbot to spread to other computers by scanning for network shares with weak...
Published Date:Apr 11, 2011
Alert level:high

Backdoor:Win32/Rbot.SF
Alias:Win32/Rbot(ESET),Win32/Rbot!generic(CA)
Description:Backdoor:Win32/Rbot.SF is a backdoor trojan that may connect to a remote attacker to perform actions on the system without the user's knowledge.
Published Date:Apr 11, 2011
Alert level:severe

Backdoor:Win32/Rbot.gen
Alias:Win32/Rbot(ESET)
Description:Backdoor:Win32/Rbot.gen is a generic detection for a family of backdoor trojans that allows attackers to control infected computers. After a computer is infected, the trojan connects to a specific IRC server and joins a specific channel to receive commands from attackers. Commands can instruct the...
Published Date:May 14, 2010
Alert level:severe

Backdoor:Win32/Rbot
Alias:Win32/Rbot.Y(ESET),Win32/Rbot!generic(CA)
Description:Backdoor:Win32/Rbot is a family of backdoor Trojans that allows attackers to control infected computers. After a computer is infected, the Trojan connects to a specific IRC server and joins a specific channel to receive commands from attackers. Commands can instruct the Trojan to spread to other...
Published Date:Apr 11, 2011
Alert level:severe

Backdoor:Win32/Rbot.gen!G
Alias:Backdoor:Win32/RBot(other),Win32/Rbot!generic(CA)
Description:Backdoor:Win32/Rbot.gen!G is a backdoor trojan that allows unauthorized access and control of an affected machine. This malware may also be able to spread in a number of different ways. Typically, the spreading mechanism is started manually by a remote attacker using backdoor functionality. Methods...
Published Date:May 14, 2010
Alert level:severe

Backdoor:Win32/Rbot.FN
Alias:Win32/Rbot.BMW(CA)
Description:Backdoor:Win32/Rbot.FN is a backdoor Trojan that runs in the background, gathers software installation and computer configuration details, and connects to an IRC server to receive commands from remote attackers. Commands could include instructions to spread to other computers via open network shares...
Published Date:Apr 11, 2011
Alert level:severe

Backdoor:Win32/Rbot.NF
Alias:Win32/Rbot.HIT(CA)
Description:Backdoor:Win32/Rbot.NF is a backdoor Trojan that runs in the background, gathers software installation and computer configuration details, and connects to an IRC server to receive commands from remote attackers. Commands could include instructions to spread to other computers via open network shares...
Published Date:Apr 11, 2011
Alert level:severe

Backdoor:Win32/Rbot.FU
Alias:Win32/Rbot.BSG(CA)
Description:Backdoor:Win32/Rbot.FU is a backdoor Trojan that runs in the background, gathers software installation and computer configuration details, and connects to an IRC server to receive commands from remote attackers. Commands could include instructions to spread to other computers via open network shares...
Published Date:Apr 11, 2011
Alert level:severe

Backdoor:Win32/Rbot.DF
Alias:Win32/Rbot.ACW(CA)
Description:Backdoor:Win32/Rbot.DF is a backdoor Trojan that connects to an IRC server to receive commands from remote attackers. Commands could include instructions to spread to other computers via open network shares or by exploit of a security vulnerability, or to launch a denial of service (DoS) attack...
Published Date:Apr 11, 2011
Alert level:severe

Backdoor:Win32/Rbot.DG
Alias:Win32/Rbot!generic(CA)
Description:Backdoor:Win32/Rbot.DG is a backdoor Trojan that connects to an IRC server to receive commands from remote attackers. Commands could include instructions to spread to other computers via open network shares or by exploit of a security vulnerability, or to launch a denial of service (DoS) attack...
Published Date:Apr 11, 2011
Alert level:severe