Skip to main content
Skip to main content
953 entries found. Displaying page 42 of 48.
Updated on Nov 06, 2006
Win32/Stration.DH@mm!CME-416 is a mass-mailing email worm that sends itself to addresses obtained from a wide range of file types found on the infected system. The e-mail message composed by the worm may masquerade as a failure message or as a scanning tool. Win32/Stration.DH@mm!CME-416 also acts as a Trojan downloader, attempting to download a file from a remote website. The downloaded file may be another variant of the Win32/Stration family.
Alert level: high
Updated on Dec 07, 2006
Alert level: severe
Updated on Dec 07, 2006
Alert level: severe
Updated on Dec 07, 2006
Alert level: severe
Updated on Dec 07, 2006
Alert level: severe
Updated on Dec 08, 2006
Alert level: severe
Updated on Dec 08, 2006
Alert level: severe
Updated on Dec 08, 2006
Alert level: severe
Updated on Dec 08, 2006
Alert level: severe
Updated on Dec 08, 2006
Alert level: severe
Updated on Dec 08, 2006
Alert level: severe
Updated on Dec 08, 2006
Alert level: severe
Updated on Dec 08, 2006
Alert level: severe
Updated on Feb 06, 2007
Alert level: severe
Updated on Mar 23, 2007
Alert level: severe
Updated on Mar 27, 2007
Alert level: severe
Updated on Aug 07, 2008
Win32/Canahom is a family of trojans that can be used to allow unauthorized access and control of an affected machine. Canahom consists of two components; a dropper and a DLL component that may be used to download and execute arbitrary files and to perform Distributed Denial of Service (DDoS) attacks.
Alert level: severe
Updated on Nov 29, 2004
W32.Mimail.R@mm is a mass-mailing worm that targets certain versions of Microsoft Windows. The worm sends itself as an attachment to e-mail addresses that it finds on the infected computer. The worm is activated when the user opens the attachment. The worm also launches denial of service (DoS) attacks against certain Web sites.
Alert level: severe
Updated on Nov 29, 2004
Win32/Mydoom.G@mm is a mass-mailing worm that sends itself to e-mail addresses it finds on the infected computer. The worm also installs a .dll file that acts as a backdoor listening on TCP ports 80 and 1080. The worm attempts a denial-of-service (DoS) attack against www.symantec.com.
Alert level: severe
Updated on Dec 03, 2004
Win32/Gaobot.ZH is a network worm that can spread across network connections by breaking weak passwords or by exploiting the vulnerability described in Microsoft Security Bulletins MS03-026. The worm has backdoor capabilities, which allows attackers to control the infected computer using IRC channels. The worm also acts as a bot on the IRC network, coordinated through the IRC command, to launch massive distributed denial of service (DDoS) attacks and retrieve personal and system information.
Alert level: severe