855 entries found.
Displaying page 15
of 43.
Backdoor:Win32/Poison.E
Updated on Feb 06, 2007
Windows Defender detects and removes this threat.
is malware that allows a remote attacker to gain backdoor access and control of your computer.
Alert level:
severe
Backdoor:IRC/WinBot
Updated on Mar 25, 2007
Backdoor:IRC/WinBot opens a backdoor on TCP port 113 and UDP port 30167, connects to an IRC channel, and downloads and installs other files. Backdoor:IRC/WinBot also includes keylogger capabilities. Some variants of Backdoor:IRC/WinBot include the Win32/Parite virus, possibly as a result of cross-infection. Win32/Parite infects portable executable files on local drives and accessible network shares.
Alert level:
severe
Worm:Win32/Nugache.F
Updated on Jan 16, 2008
Worm:Win32/Nugache.F is a minor variant of Worm:Win32/Nugache.B, and is a worm that spreads via messenger applications, and by exploiting vulnerabilities. Win32/Nugache.F may allow an attacker to remotely control an infected computer, host files via HTTP and/or FTP, and run other programs.
Alert level:
severe
Spammer:Win32/Newacc.A
Updated on Feb 15, 2008
Spammer:Win32/Newacc.A is detection for an attacker tool that automatically registers new e-mail accounts on Hotmail, AOL, Gmail, Lycos and other account service providers. To achieve this, the tool communicates with a Web Service in order to bypass CAPTCHA protection. CAPTCHA is an acronym for Completely Automated Public Turing test to tell Computers and Humans Apart.
Alert level:
severe
Win32/Newacc
Updated on Mar 11, 2008
Windows Defender Antivirus detects and removes this threat.
Win32/Newacc is detection for an attacker tool that automatically registers new e-mail accounts on Hotmail, AOL, Gmail, Lycos and other account service providers. To achieve this, the tool communicates with a Web Service in order to bypass CAPTCHA protection. CAPTCHA is an acronym for Completely Automated Public Turing test to tell Computers and Humans Apart.
Alert level:
high
Backdoor:Win32/Sereki.A
Updated on Jun 26, 2008
Backdoor:Win32/Sereki.A is a backdoor trojan that connects to certain sites, possibly to download other malware. It also ensures that it can continuously communicate to a remote server by opening up two ports.
Alert level:
severe
Backdoor:Win32/VB.CCO
Updated on Jul 18, 2008
Backdoor:Win32/VB.CCO is a backdoor trojan that may allow unauthorized access to an affected machine. This trojan could be instructed by a remote attacker to download and execute arbitrary files.
Alert level:
severe
Backdoor:Win32/Rbot.gen!G
Updated on Sep 05, 2008
Backdoor:Win32/Rbot.gen!G is a backdoor trojan that allows unauthorized access and control of an affected machine. This malware may also be able to spread in a number of different ways. Typically, the spreading mechanism is started manually by a remote attacker using backdoor functionality. Methods for spreading may include via Messenger applications, via weakly protected network shares, via vulnerability exploit, or via backdoors opened by other malware during previous system compromises.
A broad range of malware may be detected with this name, hence specific symptoms (such as filenames and registry modifications) may vary from instance to instance. However, this group of malware is likely to appear to be behaviorally similar.
Alert level:
severe
Backdoor:Perl/Small.B
Updated on Apr 26, 2011
Backdoor:Perl/Small.B is a trojan Perl script that when run, allows remote access and control by connecting to a specified remote attacker's IP address. This trojan affects Unix-based operating systems.
Alert level:
severe
Backdoor:Win32/Gaobot.AA
Updated on Dec 21, 2004
Backdoor:Win32/Gaobot.AA is a backdoor Trojan that installs a service.
Alert level:
severe
Backdoor:Win32/Rbot.FS
Updated on Mar 23, 2005
Backdoor:Win32/Rbot.FS is a backdoor Trojan that runs in the background, gathers software installation and computer configuration details, and connects to an IRC server to receive commands from remote attackers. Commands could include instructions to spread to other computers via open network shares or by exploit of a security vulnerability, or to launch a denial of service (DoS) attack against specified targets.
Alert level:
severe
Trojan:IRC/WinBot
Updated on Dec 07, 2006
Trojan:IRC/WinBot opens a backdoor on TCP port 113 and UDP port 30167, connects to an IRC channel, and downloads and installs other files. Trojan:IRC/WinBot also includes keylogger capabilities. Some variants of Trojan:IRC/WinBot include the Win32/Parite virus, possibly as a result of cross-infection. Win32/Parite infects portable executable files on local drives and accessible network shares.
Alert level:
severe
Backdoor:Win32/WinBot
Updated on Mar 25, 2007
Backdoor:Win32/WinBot opens a backdoor on TCP port 113 and UDP port 30167, connects to an IRC channel, and downloads and installs other files. Backdoor:Win32/WinBot also includes keylogger capabilities. Some variants of Backdoor:Win32/WinBot include the Win32/Parite virus, possibly as a result of cross-infection. Win32/Parite infects portable executable files on local drives and accessible network shares.
Alert level:
severe
Trojan:IRC/WinBot.dr
Updated on Mar 25, 2007
Trojan:IRC/WinBot.dr opens a backdoor on TCP port 113 and UDP port 30167, connects to an IRC channel, and downloads and installs other files. Trojan:IRC/WinBot.dr also includes keylogger capabilities. Some variants of Trojan:IRC/WinBot.dr include the Win32/Parite virus, possibly as a result of cross-infection. Win32/Parite infects portable executable files on local drives and accessible network shares.
Alert level:
severe
Win32/Vundo
Updated on Feb 26, 2008
Windows Defender Antivirus detects and removes this threat.
Win32/Vundo is a multiple-component family of malware that delivers "out of context" pop-up advertisements. Variants of the family may also download and run other files, including malware and adware.
Vundo is often installed as a browser helper object (BHO) without your consent, by other malware.
This family uses advanced defensive and stealth techniques to escape detection and to hinder removal.
Alert level:
high