Skip to main content
Skip to main content
Microsoft Security Intelligence
855 entries found. Displaying page 2 of 43.
Updated on Aug 05, 2008
Trojan:Win32/Disabler is Microsoft's detection for a trojan that disables the Windows Firewall/Internet Connection Sharing (ICS) service. It attempts to modify system settings to make its removal difficult.
Alert level: severe
Updated on Aug 12, 2008
TrojanDownloader:Win32/Cbeplay.gen!E is a trojan that may upload computer operating system details to a remote web site and download and execute arbitrary files. This trojan may be distributed via spam e-mail, either directly as a password-protected zip attachment, or indirectly via a link to a remote copy of the trojan.
Alert level: severe
Updated on Aug 28, 2008
Backdoor:Win32/Turkojan.A is a backdoor trojan that connects to a remote server, allowing an attacker to gain control of the entire system.
Alert level: severe
Updated on Jul 06, 2009
Backdoor:PHP/Shell.A is a Hypertext Preprocessor (.PHP) script that is used to compromise a server running a vulnerable PHP application. Once compromised, information is returned to a remote attacker via the script execution request.
Alert level: severe
Updated on Mar 29, 2012

Backdoor:MacOS/Longage.A is a backdoor trojan that allows an unauthorized user to access and control your computer. The trojan is in a fat Mach-O binary format, and therefore runs on two architectures: PowerPC (which is supported by a variety of operating systems, including Mac OS), and i386 (which is supported by certain versions of Mac).

Alert level: severe
Updated on Dec 03, 2004
Backdoor:Win32/Sdbot.A is a backdoor Trojan that allows an attacker to take control of an infected computer. When a computer is infected, the Trojan connects to an Internet Relay Chat (IRC) server and joins a channel in order to receive commands from the controlling attacker. These commands can instruct the Trojan to perform a number of different actions.
Alert level: severe
Updated on Jan 24, 2005
Backdoor:Win32/Rbot.CZ is a backdoor Trojan that connects to an IRC server to receive commands from remote attackers. Commands could include instructions to spread to other computers via open network shares or by exploit of a security vulnerability, or to launch a denial of service (DoS) attack against specified targets.
Alert level: severe
Updated on Jan 24, 2005
Win32/Randex.FN.worm is a network worm that targets computers running certain versions of Microsoft Windows. The worm generates and scans IP addresses randomly to spread to writeable network shares that have weak passwords. After the worm infects a computer, it connects to an IRC server to receive commands from an attacker.
Alert level: severe
Updated on Mar 18, 2005
Virtool:Win32/FURootkit.A is a kernel-mode rootkit program that targets computers running certain versions of Microsoft Windows. It is primarily used to hide certain processes from process viewers or to hide certain device drivers. This rootkit is often bundled with other malicious software. For example, it is installed on a computer by some variants of Win32/Rbot.
Alert level: severe
Updated on Apr 20, 2005
Microsoft security software detects and removes this family of threats.
 
This family of backdoor trojans can give a malicious hacker access and control of your PC. They connect to an internet relay chat (IRC) server to receive commands from the hacker. 
 
They can then spread to other PCs, launch denial of service (DoS) attacks, and collect information about your PC.
Alert level: high
Updated on Jun 27, 2005
Windows Defender Antivirus detects and removes this threat.
 
Win32/Optix is a family of highly configurable backdoor trojans that targets several versions of Microsoft Windows. The Trojan opens a backdoor that allows an attacker to control an infected PC remotely. It can also release system information to an attacker and disable security-related and other programs. 
Alert level: severe
Updated on Aug 22, 2007
Win32/Sdbot is a family of backdoor Trojans that allows attackers to control infected computers. After a computer is infected, the Trojan connects to an internet relay chat (IRC) server and joins a channel to receive commands from attackers. These commands can instruct the Trojan to spread to other computers and can allow attackers to perform other backdoor functions, such as launching denial of service (DoS) attacks and retrieving system information from infected computers.
Alert level: severe
Updated on Sep 07, 2007
TrojanDropper:Win32/Nuwar.B is a Trojan that drops and installs Backdoor:Win32/Nuwar.A onto an infected computer.
 
Backdoor:Win32/Nuwar.A is a Backdoor Trojan that allows unauthorized access to an infected computer. The Trojan receives commands indirectly from a remote attacker via its connection to a malicious peer-to-peer network. This Trojan also contains advanced stealth functionality that allows it to hide particular files, registry entries and registry values.
Alert level: severe
Updated on Nov 19, 2007
Win32/Sdbot is a family of backdoor Trojans that allows attackers to control infected computers. After a computer is infected, the Trojan connects to an internet relay chat (IRC) server and joins a channel to receive commands from attackers. These commands can instruct the Trojan to spread to other computers and can allow attackers to perform other backdoor functions, such as launching denial of service (DoS) attacks and retrieving system information from infected computers.
Alert level: severe
Updated on Sep 11, 2008
Worm:Win32/Slenfbot.OF is a worm that can spread via MSN Messenger, and may spread via removable drives. The worm also contains backdoor functionality that allows unauthorized access to an affected machine. This worm does not spread automatically upon installation, but must be ordered to spread by a remote attacker.
Alert level: severe
Updated on Jun 15, 2005
Backdoor:Win32/Samsteal.A.dr is a Trojan dropper that targets several versions of Microsoft Windows. The Trojan drops a file that in turn drops Backdoor:Win32/Samsteal.A and three other files. 
Alert level: severe
Updated on Jul 21, 2004
Backdoor:Win32/Berbew.A is a backdoor Trojan that downloads to a computer using another downloader Trojan that is sent through e-mail. Backdoor:Win32/Berbew.A retrieves locally cached passwords and sends them to a Web site. It also opens certain ports.
Alert level: severe
Updated on Dec 11, 2004
Backdoor:Win32/Berbew.AK is a backdoor Trojan that downloads to a computer by another downloader Trojan that is sent in e-mail. Backdoor:Win32/Berbew.AK retrieves locally cached passwords and sends them to a Web site. It also opens certain ports.
Alert level: severe
Updated on Dec 16, 2004
Backdoor:Win32/Berbew.C is a backdoor Trojan that downloads to a computer by another downloader Trojan that is sent in e-mail. Backdoor:Win32/Berbew.C retrieves locally cached passwords and sends them to a Web site. It also opens certain ports.
Alert level: severe
Updated on Dec 16, 2004
Backdoor:Win32/Berbew.D is a backdoor Trojan that downloads to a computer by another downloader Trojan that is sent in e-mail. Backdoor:Win32/Berbew.D retrieves locally cached passwords and sends them to a Web site. It also opens certain ports.
Alert level: severe