787 entries found.
Displaying page 13
of 40.
Worm:Win32/Mytob.BR@mm
Updated on Oct 03, 2005
Win32/Mytob.BR@mm is a mass-mailing network worm that targets certain versions of Windows. The worm sends a copy of itself as an e-mail attachment to e-mail addresses found on the infected computer. The worm can also spread by exploiting the Windows DCOM RPC vulnerability described in Microsoft Security Bulletin MS03-026. Win32/Mytob.BR@mm has a backdoor component that connects to an IRC server to receive commands from attackers.
Alert level:
severe
Worm:Win32/Mytob.Q@mm
Updated on Oct 04, 2005
Win32/Mytob.Q@mm is a mass-mailing network worm that targets certain versions of Windows. The worm sends a copy of itself as an attachment to e-mail addresses found on the infected computer. The worm can also spread by exploiting the Windows DCOM RPC vulnerability described in Microsoft Security Bulletin MS03-026. Win32/Mytob.Q@mm has a backdoor component that connects to an IRC server to receive commands from attackers.
Alert level:
severe
Worm:Win32/Mytob.R@mm
Updated on Nov 07, 2005
Win32/Mytob.R@mm is a mass-mailing worm that spreads as an attachment through e-mail. It can also spread to computers that have not been patched for the vulnerability described in Microsoft Security Bulletin MS04-011. Win32/Mytob.R@mm has a backdoor component that connects to an IRC server from the infected computer, allowing it to receive commands from attackers.
Alert level:
severe
Worm:Win32/Bobax.O@mm!CME419
Updated on Nov 27, 2006
Win32/Bobax.O@mm is a mass-mailing network worm that targets computers running certain versions Microsoft Windows. The worm targets computers running Windows 2000 by exploiting the Windows Plug-and-Play buffer overflow vulnerability that is fixed with Microsoft Security Bulletin MS05-039. The worm can also send a copy of itself as an e-mail attachment to e-mail addresses that it gathers from the infected computer.
Alert level:
severe
Worm:Win32/Sober.Q@mm!CME456
Updated on Nov 30, 2006
Win32/Sober.Q@mm is a mass-mailing worm that targets computers running certain versions of Microsoft Windows. The worm spreads by sending a copy of itself as an attachment to e-mail addresses found on the infected computer. The e-mail may be in English or German. The worm runs when the user opens the attachment.
Alert level:
severe
Backdoor:Win32/Rbot.DH
Updated on Sep 02, 2004
Backdoor:Win32/Rbot.DH is a backdoor Trojan that connects to an IRC server to receive commands from remote attackers. Commands could include instructions to spread to other computers via open network shares or by exploit of a security vulnerability, or to launch a denial of service (DoS) attack against specified targets.
Alert level:
severe
Backdoor:Win32/Rbot.BB
Updated on Nov 05, 2004
Backdoor:Win32/Rbot.BB is a backdoor Trojan that connects to an IRC server to receive commands from remote attackers. Commands could include instructions to spread to other computers via open network shares or by exploit of a security vulnerability, or to launch a denial of service (DoS) attack against specified targets.
Alert level:
severe
Win32/Nachi
Updated on Nov 12, 2004
Win32/Nachi is a family of network worms that spread across network connections by exploiting one or more vulnerabilities in Microsoft Windows 2000 and Windows XP. These worms can also spread using backdoors opened by other malicious software. The worm tries to download and apply security updates; some variants try to remove other malicious software that may be on the infected computer. Some variants replace Web pages stored on the computer with their own Web page.
Alert level:
severe
Backdoor:Win32/Rbot.BV
Updated on Dec 07, 2004
Backdoor:Win32/Rbot.BV is a backdoor Trojan that connects to an IRC server to receive commands from remote attackers. Commands could include instructions to spread to other computers via open network shares or by exploit of a security vulnerability, or to launch a denial of service (DoS) attack against specified targets.
Alert level:
severe
Backdoor:Win32/Rbot.CB
Updated on Dec 23, 2004
Backdoor:Win32/Rbot.CB is a backdoor Trojan that connects to an IRC server to receive commands from remote attackers. Commands could include instructions to spread to other computers via open network shares or by exploit of a security vulnerability, or to launch a denial of service (DoS) attack against specified targets.
Alert level:
severe
Win32/Randex
Updated on Jan 12, 2005
Windows Defender Antivirus detects and removes this threat.
Win32/Randex is a family of worms that targets PCs running Microsoft Windows 9x, Windows NT 4.0, Windows 2000, Windows Server 2003, and Windows XP. T
he worm scans randomly-generated IP addresses to attempt to spread to network shares with weak passwords. After the worm infects a PC, it connects to an IRC server to receive commands from the attacker. If your PC is infected by this worm, you might notice crashes or slowdowns during normal operation.
Alert level:
severe
Backdoor:Win32/Gaobot.DD
Updated on Feb 22, 2005
Backdoor:Win32/Gaobot.DD is a backdoor Trojan that targets certain versions of Microsoft Windows. The Trojan allows remote attackers to control a computer through an IRC channel. When the Trojan receives certain commands, it may spread to other computers or target certain Web sites for denial of service (DoS) attacks.
Alert level:
severe
Backdoor:Win32/Rbot.FE
Updated on Mar 09, 2005
Backdoor:Win32/Rbot.FE is a backdoor Trojan that runs in the background, gathers software installation and computer configuration details, and connects to an IRC server to receive commands from remote attackers. Commands could include instructions to spread to other computers via open network shares or by exploit of a security vulnerability, or to launch a denial of service (DoS) attack against specified targets.
Alert level:
severe
Backdoor:Win32/Rbot.FK
Updated on Mar 14, 2005
Backdoor:Win32/Rbot.FK is a backdoor Trojan that runs in the background, gathers software installation and computer configuration details, and connects to an IRC server to receive commands from remote attackers. Commands could include instructions to spread to other computers via open network shares or by exploit of a security vulnerability, or to launch a denial of service (DoS) attack against specified targets.
Alert level:
severe
Win32/Spyboter
Updated on Jul 25, 2005
Windows Defender Antivirus detects and removes this threat.
Win32/Spyboter is a family of backdoor trojans that targets certain versions of Microsoft Windows.
The trojan injects code into explorer.exe and allows attackers to control the PC through an IRC channel.
Alert level:
severe
Win32/Sober.Q@mm
Updated on Aug 10, 2005
Win32/Sober.Q@mm is a mass-mailing worm that targets computers running certain versions of Microsoft Windows. The worm spreads by sending a copy of itself as an attachment to e-mail addresses found on the infected computer. The e-mail may be in English or German. The worm runs when the user opens the attachment.
Alert level:
high
Win32/Stration
Updated on Nov 27, 2006
Win32/Stration is a family of mass-mailing email worms that send themselves to addresses obtained from a wide range of file types found on the infected system. The e-mail message composed by the worm may masquerade as a failure message or as a scanning tool. Win32/Stration also acts as a Trojan downloader, attempting to download a file from a remote website. The downloaded file may be another variant of the Win32/Stration family.
Alert level:
high
Backdoor:Win32/Sdbot!CC62
Updated on May 29, 2007
Backdoor:Win32/Sdbot!CC62 connects to a remote Internet Relay Chat (IRC) server and provides attackers with remote access to the impacted system. Commands that can be remotely executed include shutting down antivirus and other security-related software and using exploits to spread to other computers.
Alert level:
severe
Backdoor:Win32/Rbot.BK
Updated on Nov 22, 2004
Backdoor:Win32/Rbot.BK is a backdoor Trojan that connects to an IRC server to receive commands from remote attackers. Commands could include instructions to spread to other computers via open network shares or by exploit of a security vulnerability, or to launch a denial of service (DoS) attack against specified targets.
Alert level:
severe
Worm:Win32/Sasser.A
Updated on Jul 14, 2004
Win32/Sasser.A is a network worm that exploits the Local Security Authority Subsystem Service (LSASS) vulnerability fixed in Microsoft Security Update MS04-011. The worm targets Windows 2000 and Windows XP computers that have not installed the MS04-011 security update. Infected computers attempt to spread the worm to other unprotected computers by randomly scanning IP addresses and infecting vulnerable computers.
Alert level:
severe