67 entries found.
Displaying page 2
of 4.
Backdoor:Win32/Rbot.FU
Updated on Mar 28, 2005
Backdoor:Win32/Rbot.FU is a backdoor Trojan that runs in the background, gathers software installation and computer configuration details, and connects to an IRC server to receive commands from remote attackers. Commands could include instructions to spread to other computers via open network shares or by exploit of a security vulnerability, or to launch a denial of service (DoS) attack against specified targets.
Alert level:
severe
Backdoor:Win32/Rbot.FW
Updated on Apr 13, 2005
Backdoor:Win32/Rbot.FW is a backdoor Trojan that runs in the background, gathers software installation and computer configuration details, and connects to an IRC server to receive commands from remote attackers. Commands could include instructions to spread to other computers via open network shares or by exploit of a security vulnerability, or to launch a denial of service (DoS) attack against specified targets.
Alert level:
severe
Backdoor:Win32/Rbot.FN
Updated on Aug 30, 2005
Backdoor:Win32/Rbot.FN is a backdoor Trojan that runs in the background, gathers software installation and computer configuration details, and connects to an IRC server to receive commands from remote attackers. Commands could include instructions to spread to other computers via open network shares or by exploit of a security vulnerability, or to launch a denial of service (DoS) attack against specified targets.
Alert level:
severe
Backdoor:Win32/Rbot!8A89
Updated on Jun 18, 2007
Backdoor:Win32/Rbot!8A89 is a backdoor Trojan that connects to an IRC server to receive commands from remote attackers. Commands could include instructions to spread to other computers via open network shares or by exploit of a security vulnerability, or to launch a denial of service (DoS) attack against specified targets.
Backdoor:Win32/Rbot!8A89 may be detected as Backdoor:Win32/Rbot.AF.
Alert level:
severe
Backdoor:Win32/Rbot!2EAA
Updated on Jun 19, 2007
Backdoor:Win32/Rbot2EAA is a backdoor Trojan that connects to an IRC server to receive commands from remote attackers. Commands could include instructions to spread to other computers via open network shares or by exploit of a security vulnerability, or to launch a denial of service (DoS) attack against specified targets.
Backdoor:Win32/Rbot!2EAA may be detected as Backdoor:Win32/Rbot.AH.
Alert level:
high
Backdoor:Win32/Rbot!2FA0
Updated on Jun 25, 2007
Backdoor:Win32/Rbot!2FA0 is a backdoor Trojan that connects to an IRC server to receive commands from remote attackers. Commands could include instructions to spread to other computers via open network shares or by exploit of a security vulnerability, or to launch a denial of service (DoS) attack against specified targets.
Backdoor:Win32/Rbot!2FA0 may be detected as Backdoor:Win32/Rbot.BH.
Alert level:
severe
Backdoor:Win32/Agent!9972
Updated on Aug 17, 2007
Backdoor:Win32/Agent!9972 is a backdoor Trojan that allows an attacker to take control of an infected computer. When a computer is infected, the Trojan connects to an Internet Relay Chat (IRC) server and joins a channel in order to receive commands from the controlling attacker. These commands can instruct the Trojan to perform a number of different actions, including downloading and installing additional components and spreading to other computers via MSN Messenger.
Alert level:
severe
Backdoor:Win32/Rbot.NF
Updated on Sep 10, 2007
Backdoor:Win32/Rbot.NF is a backdoor Trojan that runs in the background, gathers software installation and computer configuration details, and connects to an IRC server to receive commands from remote attackers. Commands could include instructions to spread to other computers via open network shares or by exploit of a security vulnerability, or to launch a denial of service (DoS) attack against specified targets.
Alert level:
severe
Worm:Win32/Mytob.RR
Updated on Oct 14, 2008
Worm:Win32/Mytob.RR is a mass-mailing worm that that targets computers running certain versions of Microsoft Windows and computers across a network. The worm can spread by exploiting Windows vulnerabilities that are fixed by installing Microsoft Security Updates MS03-026 and MS04-011.
The worm can spread by sending a copy of itself through e-mail, AOL Messenger, MSN Messenger, or Windows Messenger. The worm also spreads by copying itself to common shared folders for peer-to-peer file sharing applications such as Morpheus, Limewire, Emule and others. Win32/Mytob.RR has a backdoor component that connects to an IRC server from the infected computer, allowing it to receive commands from attackers.
Alert level:
severe
Worm:Win32/Pushbot.IN
Updated on Nov 12, 2008
Worm:Win32/Pushbot.IN is a worm that spreads via MSN Messenger and AIM when commanded to by a remote attacker. This worm contains backdoor functionality that allows unauthorized access and control of an infected system.
Alert level:
severe
Worm:Win32/Pushbot.LZ
Updated on May 06, 2009
Worm:Win32/Pushbot.LZ is a worm that may spread via MSN Messenger or by sending malicious exploit code to machines vulnerable to Microsoft Security Bulletin MS08-067. This worm also contains backdoor functionality that allows unauthorized access to an affected machine. It does not spread automatically upon installation, but must be ordered to spread by a remote attacker.
Alert level:
severe
Worm:Win32/Pushbot.LY
Updated on May 20, 2009
Worm:Win32/Pushbot.LY is a worm that may spread via MSN Messenger or by sending malicious exploit code to machines vulnerable to Microsoft Security Bulletin MS08-067. This worm also contains backdoor functionality that allows unauthorized access to an affected machine. It does not spread automatically upon installation, but must be ordered to spread by a remote attacker.
Alert level:
severe
Worm:Win32/Yoybot.gen
Updated on Oct 29, 2009
Worm:Win32/Yoybot.gen is a generic detection for a family of malicious IRC bots that are able to spread through removable drives and file sharing networks.
Alert level:
severe
Backdoor:Win32/Rbot.AG
Updated on Sep 29, 2004
Backdoor:Win32/Rbot.AG is a backdoor Trojan that connects to an IRC server to receive commands from remote attackers. Commands could include instructions to spread to other computers via open network shares or by exploit of a security vulnerability, or to launch a denial of service (DoS) attack against specified targets.
Backdoor:Win32/Rbot.AG may be detected as Backdoor:Win32/Rbot.gen!A.
Alert level:
severe
Backdoor:Win32/Rbot.AK
Updated on Oct 13, 2004
Backdoor:Win32/Rbot.AK is a backdoor Trojan that connects to an IRC server to receive commands from remote attackers. Commands could include instructions to spread to other computers via open network shares or by exploit of a security vulnerability, or to launch a denial of service (DoS) attack against specified targets.
Alert level:
severe
Backdoor:Win32/Rbot.AY
Updated on Nov 03, 2004
Backdoor:Win32/Rbot.AY is a backdoor Trojan that connects to an IRC server to receive commands from remote attackers. Commands could include instructions to spread to other computers via open network shares or by exploit of a security vulnerability, or to launch a denial of service (DoS) attack against specified targets.
Alert level:
severe
Backdoor:Win32/Rbot.CQ
Updated on Jan 04, 2005
Backdoor:Win32/Rbot.CQ is a backdoor Trojan that connects to an IRC server to receive commands from remote attackers. Commands could include instructions to spread to other computers via open network shares or by exploit of a security vulnerability, or to launch a denial of service (DoS) attack against specified targets.
Alert level:
severe
Backdoor:Win32/Rbot.DG
Updated on Sep 14, 2004
Backdoor:Win32/Rbot.DG is a backdoor Trojan that connects to an IRC server to receive commands from remote attackers. Commands could include instructions to spread to other computers via open network shares or by exploit of a security vulnerability, or to launch a denial of service (DoS) attack against specified targets.
Alert level:
severe
Backdoor:Win32/Rbot.AW
Updated on Nov 03, 2004
Backdoor:Win32/Rbot.AW is a backdoor Trojan that connects to an IRC server to receive commands from remote attackers. Commands could include instructions to spread to other computers via open network shares or by exploit of a security vulnerability, or to launch a denial of service (DoS) attack against specified targets.
Alert level:
severe