787 entries found.
Displaying page 28
of 40.
Worm:Win32/Kelvir.AS
Updated on Mar 24, 2005
Worm:Win32/Kelvir.AS is a worm that targets computers running certain versions of Microsoft Windows. The worm spreads and is activated when a user opens a file that is sent through MSN Messenger or Windows Messenger.
Alert level:
severe
Worm:Win32/Kelvir.AT
Updated on Apr 11, 2005
Worm:Win32/Kelvir.AT is a worm that targets computers running certain versions of Microsoft Windows. The worm spreads and is activated when a user opens a file that is sent through MSN Messenger or Windows Messenger.
Alert level:
severe
Worm:Win32/Kelvir.AW
Updated on Oct 06, 2005
Worm:Win32/Kelvir.AW is a worm that targets computers running certain versions of Microsoft Windows. The worm spreads through MSN Messenger or Windows Messenger. The worm runs when a user receives a link to the worm file through the Messenger program and opens the link.
Alert level:
severe
Worm:Win32/Wootbot.K
Updated on Oct 14, 2005
Worm:Win32/Wootbot.K is a network worm that includes a backdoor component which connects to an IRC server and awaits commands from remote attackers. For example, an attacker can send a command to distribute the worm to other computers that have not been patched for the Windows LSASS vulnerability described in Microsoft Security Bulletin MS04-011.
Alert level:
severe
Worm:Win32/Kelvir.BD
Updated on Oct 18, 2005
Worm:Win32/Kelvir.BD is a worm that targets computers running certain versions of Microsoft Windows. The worm spreads through MSN Messenger or Windows Messenger. The worm runs when a user receives a link to the worm file through the Messenger program and opens the link.
Alert level:
severe
Worm:Win32/Chir.A@mm
Updated on May 26, 2006
Win32/Chir.A@mm is a mass-mailing worm. The worm sends a copy of itself as an e-mail attachment to e-mail addresses that it finds on the infected computer and remote shares. The worm runs when a user opens the e-mail attachment. On a computer that has not been patched for the Incorrect MIME Header vulnerability described in Microsoft Security Bulletin MS01-020, the attachment can open automatically under certain conditions.
Alert level:
severe
Worm:Win32/Chir.B@mm
Updated on Jun 02, 2006
Win32/Chir.B@mm is both a network and e-mail worm, as well as a virus. The e-mail worm component sends a copy of itself as an e-mail attachment to addresses that it finds on local and remote drives. Win32/Chir.B@mm also exploits the Incorrect Mime Header vulnerability discussed in Microsoft Security Bulletin (MS01-020). This may cause the e-mail attachment to open automatically when the e-mail is read or previewed on susceptible systems that have not had the MS01-020 security patch installed. Win32/Chir.B@mm infects .EXE and .SCR files on local and remote drives. Win32/Chir.B@mm also drops a copy of itself named readme.eml to folders containing .HTM and .HTML files, then appends malicious JavaScript to the bottom of these .HTM* files to cause them to automatically run the infected readme.eml file when they are opened.
Alert level:
high
Backdoor:Win32/Gaobot.AM
Updated on Dec 21, 2004
Backdoor:Win32/Gaobot.AM is a backdoor Trojan that can spread across network connections by breaking weak passwords or by exploiting vulnerabilities described in Microsoft Security Bulletins MS03-001, MS03-007, or MS03-026. After the Trojan copies and runs itself on a remote computer, it connects to an IRC server to receive commands.
Alert level:
severe
Backdoor:Win32/Gaobot.Z
Updated on Dec 22, 2004
Backdoor:Win32/Gaobot.Z is a backdoor Trojan that can spread across network connections by breaking weak passwords or by exploiting vulnerabilities described in Microsoft Security Bulletins MS03-001, MS03-007, or MS03-026. After the Trojan copies and runs itself on a remote computer, it connects to an IRC server to receive commands.
Alert level:
severe
Win32/Netsky
Updated on Jan 11, 2005
The Netsky family is a mass-mailing worm that targets computers running certain versions of Microsoft Windows. The worm sends itself to e-mail addresses that it finds on the infected computer. When a user opens an e-mail attachment that contains a Netsky variant, the worm is activated. Some variants copy the worm to network-share folders. Some variants contain a backdoor component and perform denial of service (DoS) attacks.
Alert level:
high
Win32/Bagle
Updated on Feb 15, 2005
Win32/Bagle is a family of mass-mailing worms that targets certain versions of Microsoft Windows. The worm spreads primarily through e-mail, though some variants also spread through peer-to-peer networks. The worm acts as a backdoor Trojan, allowing an attacker to access a computer that it has infected. The backdoor can be used to distribute other malicious software. Some variants of Win32/Bagle infect executable files.
Alert level:
high
Win32/Mimail
Updated on Mar 10, 2005
Windows Defender Antivirus detects and removes this threat.
W32/Mimail is a family of mass-mailing and network worms. The variants target several versions of Microsoft Windows. Some Mimail variants spread through email attachments. Some target PCs that do not have Microsoft Security Bulletins MS02-015 and MS03-014 installed. Some variants spread through peer-to-peer networks. Some variants gather and transmit user account numbers and passwords. Some variants launch denial of service (DoS) attacks against certain Web sites.
Alert level:
severe
Win32/Yaha
Updated on Jun 13, 2005
Windows Defender Antivirus detects and removes this threat.
Win32/Yaha is a family of mass-mailing network worms that targets certain versions of Microsoft Windows. The worm spreads primarily by sending a copy of itself as an attachment to e-mail addresses gathered from an infected computer. It can also spread through mapped drives and writeable network shares. The worm can terminate security-related processes and conduct denial of service (DoS) attacks against certain Web sites.
Alert level:
severe
Win32/Bagz
Updated on Jun 16, 2005
Win32/Bagz is a family of mass-mailing worms that targets certain versions of Microsoft Windows. The worm spreads as an e-mail attachment and runs when the user opens the attachment. It can download and run other malicious files from a server.
Alert level:
severe
Win32/Maslan
Updated on Nov 15, 2005
Windows Defender Antivirus detects and removes this threat.
Win32/Maslan is a family of mass-mailing network worms that targets computers running Microsoft Windows. The worm spreads through email and peer-to-peer file-sharing applications. It can also spread to computers that have not been patched for the Windows vulnerabilities described in Microsoft Security Bulletins MS03-039 and MS04-011. The worm installs two backdoors, one of which is a variant of Win32/Sdbot. The worm has a stealth component that hides certain files and directories.
Alert level:
high
Worm:Win32/Klez.H@mm
Updated on Jan 18, 2007
Win32/Klez.H@mm is a mass-mailing e-mail worm that also copies itself to local, mapped, and network shares. Win32/Klez.H@mm attempts to terminate processes associated with antivirus and security software. When sending copies of itself via e-mail, the worm may also attach randomly selected legitimate files found on the system. This could result in compromise of confidential or sensitive data.
Alert level:
severe
Worm:Win32/Klez.E@mm
Updated on Jan 18, 2007
Win32/Klez.E@mm is a mass-mailing e-mail worm that also copies itself to local, mapped, and network shares. Win32/Klez.E@mm attempts to terminate processes associated with antivirus and security software. When sending copies of itself via e-mail, the worm may also attach randomly selected legitimate files found on the system. This could result in compromise of confidential or sensitive data.
Alert level:
severe
Exploit:Win32/Siveras.E
Updated on Apr 19, 2007
Exploit:Win32/Siveras.E is detection for specific known malware used to exploit a vulnerability in the Domain Name System (DNS) Server Service. This vulnerability impacts Microsoft Windows 2000 Server Service Pack 4, Windows Server 2003 Service Pack 1, and Windows Server 2003 Service Pack 2.
For vulnerability details and patch information, please see Microsoft Security Bulletin MS07-029 at http://www.microsoft.com/technet/security/bulletin/ms07-029.mspx.
Alert level:
severe
Worm:Win32/Allaple.A
Updated on Jun 05, 2007
Worm:Win32/Allaple.A is a multi-threaded, polymorphic network worm capable of spreading to other computers connected to a local area network (LAN) and performing denial-of-service (DoS) attacks against targeted remote Web sites.
Alert level:
severe