Skip to main content
Skip to main content
787 entries found. Displaying page 20 of 40.
Updated on Jul 21, 2004
Win32/Randex.K is a network worm that targets computers running certain versions of Microsoft Windows. The worm attempts to spread by randomly scanning IP addresses for writeable network shares with weak passwords. The worm also has backdoor capabilities that allow attackers to control the infected computer through an IRC channel.
Alert level: severe
Updated on Jul 22, 2004
Win32/Randex.K is a network worm that targets computers running certain versions of Microsoft Windows. The worm attempts to spread by randomly scanning IP addresses for writeable network shares with weak passwords. The worm also has backdoor capabilities that allow attackers to control the infected computer through an IRC channel.
Alert level: severe
Updated on Jul 22, 2004
Win32/Randex.Q is a network worm that targets computers running certain versions of Microsoft Windows. The worm attempts to spread by randomly scanning IP addresses for writeable network shares with weak passwords. The worm also has backdoor capabilities that allow attackers to control the infected computer through an IRC channel.
Alert level: severe
Updated on Jul 22, 2004
Win32/Randex.W is a network worm that targets computers running certain versions of Microsoft Windows. The worm attempts to spread by randomly scanning IP addresses for writeable network shares with weak passwords. The worm also has backdoor capabilities that allow attackers to control the infected computer through an IRC channel.
Alert level: severe
Updated on Jul 23, 2004
Win32/Randex.X is a network worm that targets computers running certain versions of Microsoft Windows. The worm spreads by randomly scanning IP addresses for writeable network shares with weak passwords. The worm also has backdoor capabilities that allow attackers to control the infected computer through an IRC channel.
Alert level: severe
Updated on Jul 23, 2004
Win32/Randex.Y is a network worm that targets computers running certain versions of Microsoft Windows. The worm attempts to spread by randomly scanning IP addresses for writeable network shares with weak passwords. The worm also has backdoor capabilities that allow attackers to control the infected computer through an IRC channel.
Alert level: severe
Updated on Jul 26, 2004
Win32/Randex.T is a network worm that targets computers running certain versions of Microsoft Windows. The worm attempts to spread by randomly scanning IP addresses for writeable network shares with weak passwords. The worm also has backdoor capabilities that allow attackers to control the infected computer through an IRC channel.
Alert level: severe
Updated on Sep 01, 2004
Win32/Sasser.G.worm is a network worm that exploits the Local Security Authority Subsystem Service (LSASS) vulnerability fixed in Microsoft Security Update MS04-011. The worm targets Windows XP computers that do not have MS04-011 installed. Infected computers attempt to spread the worm to other unprotected computers by randomly scanning IP addresses and infecting vulnerable computers. This worm also infects computers with the worm Win32/Netsky.AC@mm.
Alert level: severe
Updated on Sep 15, 2004
W32.Mimail.B@mm is a mass-mailing worm that targets computers running certain versions of Microsoft Windows that do not have Microsoft Security Bulletins MS02-015 and MS03-014 installed. The worm sends itself as an attachment to e-mail addresses on the infected computer. The worm is activated when the user opens the attachment.
Alert level: severe
Updated on Sep 15, 2004
W32.Mimail.G@mm is a mass-mailing worm that targets certain versions of Microsoft Windows. The worm sends itself as an attachment to e-mail addresses on an infected computer. The worm is activated when the user opens the attachment. The worm also launches denial of service (DoS) attacks against certain Web sites.
Alert level: severe
Updated on Sep 15, 2004
W32.Mimail.I@mm is a mass-mailing worm that targets certain versions of Microsoft Windows. The worm sends itself as an attachment to e-mail addresses on an infected computer. When the user opens the attachment, it can display a Web form that the worm uses to gather and transmit user credit card information.
Alert level: severe
Updated on Sep 15, 2004
W32.Mimail.J@mm is a mass-mailing worm that targets certain versions of Microsoft Windows. The worm sends itself as an attachment to e-mail addresses on the infected computer. When the user opens the attachment, it can display a Web form that the worm uses to gather and transmit user credit card information.
Alert level: severe
Updated on Oct 07, 2004
W32.Mimail.H@mm is a mass-mailing worm that targets certain versions of Microsoft Windows. The worm sends itself as an attachment to e-mail addresses on an infected computer. The worm is activated when the user opens the attachment. The worm also launches denial of service (DoS) attacks against certain Web sites.
Alert level: severe
Updated on Nov 29, 2004
W32.Mimail.K@mm is a mass-mailing worm that targets certain versions of Microsoft Windows. The worm sends itself as an attachment to e-mail addresses that it finds on the infected computer. The worm is activated when the recipient opens the attachment.
Alert level: severe
Updated on Nov 29, 2004
W32.Mimail.M@mm is a mass-mailing worm that targets certain versions of Microsoft Windows. The worm sends itself as an attachment to e-mail addresses that it finds on the infected computer. The worm is activated when the user opens the attachment.
Alert level: severe
Updated on Nov 29, 2004
W32.Mimail.Q@mm is a mass-mailing worm that targets certain versions of Microsoft Windows. The worm sends itself as an attachment to e-mail addresses on the infected computer. The worm is activated when the user opens the attachment.
Alert level: severe
Updated on Nov 29, 2004
W32.Mimail.U@mm is a mass-mailing worm that targets certain versions of Microsoft Windows. The worm sends itself as an attachment to e-mail addresses that it finds on the infected computer. The worm is activated when the user opens the attachment. The worm also launches denial of service (DoS) attacks against certain Web sites.
Alert level: severe
Updated on Nov 29, 2004
W32.Mimail.V@mm is a network worm that targets certain versions of Microsoft Windows. The worm spreads through peer-to-peer file-sharing networks, writing itself to file-sharing folders. The worm is activated when the user opens the file that was placed in the file-sharing folder.
Alert level: severe
Updated on Dec 20, 2004
Worm:Win32/Gaobot.O is a worm that can spread across network connections by breaking weak passwords or by exploiting vulnerabilities described in Microsoft Security Bulletins MS03-001, MS03-007, or MS03-026. After the Trojan copies and runs itself on a remote computer, it connects to an IRC server to receive commands.
Alert level: severe
Updated on Dec 20, 2004
Worm:Win32/Gaobot.P is a worm that can spread across network connections by breaking weak passwords or by exploiting vulnerabilities described in Microsoft Security Bulletins MS03-001, MS03-007, or MS03-026. After the Trojan copies and runs itself on a remote computer, it connects to an IRC server to receive commands.
Alert level: severe