787 entries found.
Displaying page 12
of 40.
Worm:Win32/Brontok.AS@mm
Updated on Dec 08, 2006
Worm:Win32/Brontok.AS@mm is a mass-mailing email worm that modifies certain computer settings, such as how hidden files are displayed, and disables registry editing.
It spreads by sending a copy of itself, as an email attachment, to contacts stored on your computer. It can also copy itself to USB and removable drives.
Worm:Win32/Brontok.AS@mm is a member of the Worm:Win32/Brontok@mm and Win32/Brontok families.
Alert level:
severe
Backdoor:Win32/Poebot.A
Updated on Jan 26, 2007
Backdoor:Win32/Poebot.A is a backdoor trojan that allow remote attackers to control infected computers. After a computer is infected, the trojan connects to a specific IRC server and joins a specific channel to receive commands from attackers. Commands can instruct the trojan to spread to other computers by scanning for network shares with weak passwords, exploiting unpatched vulnerabilities, and spreading through backdoor ports opened by other families of malicious software. The trojan can also allow attackers to perform other backdoor functions, such as launching denial of service (DoS) attacks and retrieving system information from infected computers. In addition, the trojan may be used to steal CD keys and licensing credentials for various online games.
Alert level:
severe
Worm:Win32/Brontok.BU@mm
Updated on Jul 18, 2007
Worm:Win32/Brontok.BU@mm is a mass-mailing e-mail worm that spreads by sending a copy of itself as an e-mail attachment to e-mail addresses that it gathers from files on the infected computer. Worm:Win32/Brontok.BU@mm can also copy itself to USB and pen drives. This worm can disable antivirus and security software, immediately terminate certain applications, and cause Windows to restart immediately when certain applications run. This worm may conduct denial of service (DoS) attacks against certain Web sites.
Alert level:
severe
Worm:Win32/Randex.A
Updated on Jul 15, 2004
Win32/HLLW.Randex.A is a worm that targets computers running certain versions of Microsoft Windows. The worm generates and scans IP addresses randomly to attempt to spread to writeable network shares that have weak passwords. If your computer is infected by this worm, you may notice crashes or slowdowns during normal operation.
Alert level:
severe
Worm:Win32/Nachi.A
Updated on Jul 21, 2004
Win32/HLLW.Nachi.A is a network worm that targets Microsoft Windows 2000 and Windows XP. It propagates by exploiting several known vulnerabilities. It tries to download and apply security updates if it detects the operating system is a certain language version. It also tries to remove the MSBlast worm if it is on the infected system.
Alert level:
severe
Worm:Win32/Mydoom.B@mm
Updated on Aug 04, 2004
Win32/Mydoom.B@mm is a mass-mailing worm that sends itself to e-mail addresses it finds on the infected computer. The worm also installs a .dll file that acts as a backdoor. After February 1, 2004, the worm attempts a denial-of-service (DoS) attack against www.sco.com.
Alert level:
severe
Worm:Win32/Mydoom.S@mm
Updated on Aug 16, 2004
Win32/Mydoom.S@mm is a mass-mailing worm that sends itself to e-mail addresses it finds on the infected computer. The worm also downloads and runs a file that acts as a backdoor.
Alert level:
severe
Worm:Win32/Mydoom.E@mm
Updated on Sep 14, 2004
Win32/Mydoom.E@mm is a mass-mailing worm that sends itself to e-mail addresses it finds on the infected computer. The worm also installs a .dll file that acts as a backdoor. After February 1, 2004, the worm attempts to perform a denial of service (DoS) attack against www.sco.com.
Alert level:
severe
Worm:Win32/Randex.FK
Updated on Sep 21, 2004
Win32/Randex.FK.worm is a network worm that targets computers running certain versions of Microsoft Windows. It scans randomly generated IP addresses to spread to network shares with weak passwords. After the worm infects a computer, it connects to an IRC server to receive commands from the attacker. If your computer is infected by Win32/Randex.FK worm, you may experience system performance degradation, slower network connectivity, or system crashes.
Alert level:
severe
Worm:Win32/Wootbot
Updated on Oct 27, 2004
Backdoor:Win32/Wootbot is a backdoor Trojan that targets certain versions of Microsoft Windows. The Trojan connects to a specific IRC server to receive commands from attackers, which can include instructions to spread to other computers in various ways, such as through network shares, SQL servers, and exploitation of certain Windows vulnerabilities.
Alert level:
severe
Worm:Win32/Sober.A@mm
Updated on Nov 29, 2004
Win32/Sober.A@mm is a mass-mailing worm that targets certain versions of Microsoft Windows. The worm sends itself as an attachment to e-mail addresses that it finds on the infected computer. The worm is activated when the e-mail recipient opens the attachment.
Alert level:
severe
Worm:Win32/Sober.K@mm
Updated on Feb 21, 2005
Win32/Sober.K@mm is a mass-mailing worm that targets certain versions of Microsoft Windows. The worm sends itself as an attachment to e-mail addresses that it finds on an infected computer. The worm is activated when a user opens the attachment.
Alert level:
severe
Worm:Win32/Mytob.S@mm
Updated on Apr 07, 2005
Win32/Mytob.S@mm is a mass-mailing worm that targets computers running certain versions of Microsoft Windows. The worm can spread in several ways: it can copy itself to writeable network shares, send itself as an e-mail or instant-messaging attachment, and exploit the Windows vulnerabilities described in Microsoft Security Bulletins MS04-011 and MS03-026. The worm has a backdoor component that allows attackers to control an infected computer through an IRC channel.
Alert level:
severe
Worm:Win32/Mytob.T@mm
Updated on Apr 07, 2005
Win32/Mytob.T@mm is a mass-mailing network worm that targets computers running certain versions of Microsoft Windows. The worm can spread through e-mail, network shares, MSN Messenger, and Windows Messenger. It can also spread by exploiting the Windows vulnerabilities described in Microsoft Security Bulletins MS04-011 and MS03-026. The worm has a backdoor component that connects to an IRC server to receive commands from attackers.
Alert level:
severe
Worm:Win32/Sober.U@mm
Updated on May 16, 2005
Win32/Sober.U@mm is a mass-mailing worm that targets certain versions of Microsoft Windows. The worm sends itself as an e-mail attachment to addresses on the infected computer. The worm is activated when a user opens the attachment.
Alert level:
severe
Worm:Win32/Lovgate.S@mm
Updated on May 26, 2005
Worm:Win32/Lovgate.S@mm is a mass-mailing worm that sends itself as an e-mail attachment to addresses found on the infected computer. To spread via networks and file shares, Worm:Win32/Lovgate.S@mm copies itself to writeable network shares and those protected by weak user name and password combinations. The worm opens a backdoor on infected systems and may send system passwords and other sensitive information to the worm's author.
Alert level:
severe
Worm:Win32/Lovgate.AC@mm
Updated on May 26, 2005
Worm:Win32/Lovgate.AC@mm is a mass-mailing worm that sends itself as an e-mail attachment to addresses found on the infected computer. To spread via networks and file shares, Worm:Win32/Lovgate.AC@mm copies itself to writeable network shares and shares protected by weak user name and password pairs. The worm opens a backdoor on infected systems and may send system passwords and other sensitive information to the worm's author.
Alert level:
severe
Worm:Win32/Lovgate.AE@mm
Updated on May 26, 2005
Worm:Win32/Lovgate.AE@mm is a mass-mailing worm that sends itself as an e-mail attachment to addresses found on the infected computer. To spread via networks and file shares, Worm:Win32/Lovgate.AE@mm copies itself to writeable network shares and those protected by weak user name and password combinations. The worm opens a backdoor on infected systems and may send system passwords and other sensitive information to the worm's author.
Alert level:
severe
Worm:Win32/Bropia.W
Updated on Aug 08, 2005
Win32/Bropia.W.worm is a worm that targets computers running certain versions of Microsoft Windows. The worm spreads as a file sent through MSN Messenger or Windows Messenger. The worm drops a variant of Backdoor:Win32/Rbot when the user opens the file.
Alert level:
severe
Worm:Win32/Bobax.O@mm
Updated on Aug 16, 2005
Win32/Bobax.O@mm is a mass-mailing network worm that targets computers running certain versions Microsoft Windows. The worm targets computers running Windows 2000 by exploiting the Windows Plug-and-Play buffer overflow vulnerability that is fixed with Microsoft Security Bulletin MS05-039. The worm can also send a copy of itself as an e-mail attachment to e-mail addresses that it gathers from the infected computer.
Alert level:
severe