787 entries found.
Displaying page 31
of 40.
Backdoor:Win32/Gaobot.X
Updated on Nov 15, 2004
Backdoor:Win32/Gaobot.X is a backdoor Trojan that connects to an IRC server to receive commands. The Trojan can spread to other machines by exploiting the vulnerabilities described in Microsoft Security Bulletins MS03-001, MS03-007, or MS03-026. It can also spread to machines with weak passwords.
Alert level:
severe
Backdoor:Win32/Gaobot.AB
Updated on Dec 21, 2004
Backdoor:Win32/Gaobot.AB is a backdoor Trojan that can spread across network connections by breaking weak passwords or by exploiting vulnerabilities described in Microsoft Security Bulletins MS03-001, MS03-007, or MS03-026. After the Trojan copies and runs itself on a remote computer, it connects to an IRC server to receive commands.
Alert level:
severe
Backdoor:Win32/Gaobot.AE
Updated on Dec 21, 2004
Backdoor:Win32/Gaobot.AE is a backdoor Trojan that can spread across network connections by breaking weak passwords or by exploiting vulnerabilities described in Microsoft Security Bulletins MS03-001, MS03-007, or MS03-026. After the Trojan copies and runs itself on a remote computer, it connects to an IRC server to receive commands.
Alert level:
severe
Backdoor:Win32/Gaobot.AF
Updated on Dec 21, 2004
Backdoor:Win32/Gaobot.AF is a backdoor Trojan that can spread across network connections by breaking weak passwords or by exploiting vulnerabilities described in Microsoft Security Bulletins MS03-001, MS03-007, or MS03-026. After the Trojan copies and runs itself on a remote computer, it connects to an IRC server to receive commands.
Alert level:
severe
Backdoor:Win32/Gaobot.AG
Updated on Dec 21, 2004
Backdoor:Win32/Gaobot.AG is a backdoor Trojan that can spread across network connections by breaking weak passwords or by exploiting vulnerabilities described in Microsoft Security Bulletins MS03-001, MS03-007, or MS03-026. After the Trojan copies and runs itself on a remote computer, it connects to an IRC server to receive commands.
Alert level:
severe
Backdoor:Win32/Gaobot.AP
Updated on Dec 21, 2004
Backdoor:Win32/Gaobot.AP is a backdoor Trojan that can spread across network connections by breaking weak passwords or by exploiting vulnerabilities described in Microsoft Security Bulletins MS03-001, MS03-007, or MS03-026. After the Trojan copies and runs itself on a remote computer, it connects to an IRC server to receive commands.
Alert level:
severe
Backdoor:Win32/Gaobot.AU
Updated on Dec 22, 2004
Backdoor:Win32/Gaobot.AU is a backdoor Trojan that can spread across network connections by breaking weak passwords or by exploiting vulnerabilities described in Microsoft Security Bulletins MS03-001, MS03-007, or MS03-026. After the Trojan copies and runs itself on a remote computer, it connects to an IRC server to receive commands.
Alert level:
severe
Backdoor:Win32/Gaobot.CY
Updated on Dec 22, 2004
Backdoor:Win32/Gaobot.CY is a backdoor Trojan that can spread across network connections by breaking weak passwords or by exploiting vulnerabilities described in Microsoft Security Bulletins MS03-001, MS03-007, or MS03-026. After the Trojan copies and runs itself on a remote computer, it connects to an IRC server to receive commands.
Alert level:
severe
Backdoor:Win32/Gaobot.F
Updated on Dec 22, 2004
Backdoor:Win32/Gaobot.F is a backdoor Trojan that can spread across network connections by breaking weak passwords or by exploiting vulnerabilities described in Microsoft Security Bulletins MS03-001, MS03-007, or MS03-026. The Trojan can also spread to other computers using the KaZaA peer-to-peer file sharing network. After the Trojan copies and runs itself on a remote computer, it connects to an IRC server to receive commands.
Alert level:
severe
Backdoor:Win32/Rbot.MC
Updated on Aug 17, 2005
Backdoor:Win32/Rbot.MC is a backdoor Trojan that targets computers running certain versions of Microsoft Windows. The Trojan connects to an IRC server from the infected computer to receive commands from attackers. These commands can include copying the Trojan to other computers through network shares with weak passwords, through backdoor ports opened by other malicious software, or through the Windows Plug-and-Play vulnerability described in Microsoft Security Bulletin MS05-039.
Alert level:
severe
Worm:Win32/Netsky.A@mm
Updated on Jul 13, 2004
Win32/Netsky.A@mm is a mass-mailing worm that targets computers running certain versions of Microsoft Windows. The worm is activated when a user opens the e-mail attachment that contains the worm. The worm sends itself to e-mail addresses that it finds on the infected computer. The worm also copies itself to folders on the infected computer.
Alert level:
severe
Worm:Win32/Mimail.P@mm
Updated on Jul 15, 2004
W32.Mimail.P@mm is a mass-mailing worm that targets certain versions of Microsoft Windows. The worm sends itself as an attachment to e-mail addresses on the infected computer. When the user opens the attachment, it can display a series of dialog boxes that the worm uses to gather and transmit user credit card information.
Alert level:
severe
Worm:Win32/Netsky.B@mm
Updated on Jul 22, 2004
Win32/Netsky.B@mm is a mass-mailing worm that targets computers running certain versions of Microsoft Windows. The worm sends itself to e-mail addresses that it finds on the infected computer. The worm is activated when a user opens an e-mail attachment that contains the worm.
Alert level:
severe
Worm:Win32/Netsky.C@mm
Updated on Jul 22, 2004
Win32/Netsky.C@mm is a mass-mailing worm that targets computers running certain versions of Microsoft Windows. The worm sends itself to e-mail addresses that it finds on the infected computer. The worm is activated when a user opens an e-mail attachment that contains the worm. There may be no readily apparent indications that a computer is infected with this worm.
Alert level:
severe
Worm:Win32/Bagle.AA@mm
Updated on Aug 04, 2004
Win32/Bagle.AA@mm is a mass-mailing worm that targets computers running certain versions of Microsoft Windows. The worm sends itself as an attachment to e-mail addresses that it finds in files on the infected computer. It also spreads through file-sharing networks. The worm opens a backdoor and monitors a TCP port for instructions from remote attackers.
Alert level:
severe
Worm:Win32/Mimail.D@mm
Updated on Aug 04, 2004
W32.Mimail.D@mm is a mass-mailing worm that targets computers running certain versions of Microsoft Windows that do not have Microsoft Security Bulletins MS02-015 and MS03-014 installed. The worm sends itself to e-mail addresses that it finds on the infected computer. The worm is activated when the user opens the attachment. The worm also gathers and transmits user account numbers and passwords.
Alert level:
severe
Worm:Win32/Netsky.D@mm
Updated on Aug 06, 2004
Win32/Netsky.D@mm is a mass-mailing worm that targets computers running certain versions of Microsoft Windows. The worm sends itself to e-mail addresses that it finds on the infected computer. The worm is activated when a user opens an e-mail attachment that contains the worm. There may be no readily apparent indications that a computer is infected with this worm.
Alert level:
severe