Skip to main content
Skip to main content
Microsoft Security Intelligence
953 entries found. Displaying page 5 of 48.
Updated on Jul 18, 2014

Windows Defender detects and removes this threat.

This threat can steal your personal information, such as your user names and passwords. It sends the stolen information to a malicious hacker.

Find out ways that malware can get on your PC.

Alert level: severe
Updated on Jul 31, 2014

Windows Defender detects and removes this threat.

A trojan is a type of malware that tries to look innocent to convince you to install it on your PC.

It can steal your personal information, download more malware, or give a malicious hacker access to your PC.

Find out ways that malware can get on your PC

Alert level: severe
Updated on Aug 08, 2014

Windows Defender detects and removes this threat.

This malware family can perform a number of actions of a malicious hacker's choice on your PC.

Find out ways that malware can get on your PC.

Alert level: severe
Updated on Aug 21, 2014

Windows Defender detects and removes this threat.

The threat is used by other malware to download more malware onto your PC. This means that if you have this malware, it's highly likely you also have Win32/KuluozWin32/Zbot, Win32/Rovnix, or others.

This malware is installed by Win32/Kuluoz. It can also get on your PC when you visit links to compromised or malicious websites sent in spam emails.

Find out ways that malware can get on your PC.  

Alert level: severe
Updated on Sep 23, 2014

Windows Defender detects and removes this family of threats.

These threats connect to a remote server to receive instructions from a malicious hacker. This can include downloading files onto your PC.

They can be installed when you visit a malicious or hacked website.

Alert level: severe
Updated on Nov 27, 2014

Microsoft security software detects and removes this family of threats.

These threats can give a malicious hacker access and control of your PC. They can download and run files, and steal your sensitive information.

Some variants specifically target the administration traffic of mobile base station controllers that are used by telecommunication providers. This stolen data could let a malicious hacker monitor and control the calls of an affected phone provider.

Find out ways that malware can get on your PC.  

Alert level: severe
Updated on Jan 05, 2015

Windows Defender detects and removes this family of threats.

This malware family can download other threats onto your PC.

They can be installed by an exploit when you visit a malicious or compromised website.

Find out ways that malware can get on your PC.  

Alert level: severe
Updated on Feb 05, 2015

Windows Defender detects and removes this threat.

This threat can give a malicious hacker access and control of your PC. They can then perform a number of actions, including downloading other malware.

Find out ways that malware can get on your PC.

 

Alert level: severe
Updated on Mar 26, 2015

Windows Defender detects and removes this threat.

The threat can install other malware on your PC, including malware that can record your passwords, take pictures with your webcam, and steal your information.

It spreads by copying itself to removable drives.

This threat might have got on your PC if you downloaded a file from a file sharing website, or used an infected removable drive, like a USB flash drive.

Find out ways that malware can get on your PC.

Alert level: severe
Updated on Jan 31, 2005
Win32/Sobig.A@mm is a mass-mailing worm that targets computers running certain versions of Microsoft Windows. The worm sends itself to e-mail addresses that it finds on the infected computer. The worm can also spread to writeable network shares.
Alert level: severe
Updated on Jul 16, 2006

This program was detected by definitions prior to 1.175.2424.0 as it violated the guidelines by which Microsoft identified unwanted software. Based on analysis using current guidelines, the program does not have unwanted behaviors.

Alert level: moderate
Updated on Sep 12, 2006
TrojanDownloader:Win32/Renos automatically downloads unwanted software such as SpySheriff, SpyAxe, SpyFalcon, SpyDawn, SpywareStrike, and other similarly named programs. These programs typically present erroneous warnings claiming the system is infected with spyware and offer to remove the alleged spyware for a fee. In some cases, the programs may also cause system instability.
Alert level: severe
Updated on Aug 22, 2007
Win32/Sdbot is a family of backdoor Trojans that allows attackers to control infected computers. After a computer is infected, the Trojan connects to an internet relay chat (IRC) server and joins a channel to receive commands from attackers. These commands can instruct the Trojan to spread to other computers and can allow attackers to perform other backdoor functions, such as launching denial of service (DoS) attacks and retrieving system information from infected computers.
Alert level: severe
Updated on Sep 07, 2007
Storm Worm, or Win32/Nuwar, refers to a family of Trojan droppers that install a distributed peer-to-peer (P2P) downloader Trojan. This downloader Trojan in turn downloads a copy of the email worm component of Storm Worm.
Alert level: high
Updated on Oct 16, 2007
Backdoor:Win32/Sdbot.ZA is a backdoor Trojan that allows an attacker to take control of an infected computer. When a computer is infected, the Trojan connects to an Internet Relay Chat (IRC) server and joins a channel in order to receive commands from the controlling attacker. This malware can also spread via network shares with weak passwords, and by exploiting a known vulnerability in the RPCSS Service (addressed in Microsoft Security Bulletin MS03-039).
Alert level: severe
Updated on Oct 18, 2007
WinNT/Bagle is a component of the greater Win32/Bagle multi-component family of malware. WinNT/Bagle provides advanced stealth functionality and anti-removal measures for this family.
Alert level: high
Updated on Nov 19, 2007
Win32/Sdbot is a family of backdoor Trojans that allows attackers to control infected computers. After a computer is infected, the Trojan connects to an internet relay chat (IRC) server and joins a channel to receive commands from attackers. These commands can instruct the Trojan to spread to other computers and can allow attackers to perform other backdoor functions, such as launching denial of service (DoS) attacks and retrieving system information from infected computers.
Alert level: severe
Updated on Nov 10, 2010

Windows Defender Antivirus detects and removes this threat. 

This family of programs claim to scan for hardware defects related to system memory, hard drives and over-all system performance. They show fake hardware problems and ask you to pay money to repair them.

Alert level: severe
Updated on Aug 31, 2004
Win32/Spybot is a network worm that targets certain versions of Microsoft Windows. The worm can spread through writeable network shares that have weak administrator passwords, or through peer-to-peer, file-sharing programs. It can also spread by exploiting various Windows vulnerabilities. Win32/Spybot also has a backdoor component that allows attackers to control an infected computer.
Alert level: high
Updated on Nov 04, 2004
The Berbew family of Trojans retrieves passwords stored on an infected system and sends them to a remote Web server. It also acts as a Web proxy, which allows attackers to use the infected system as a relay for remote access to other systems. Users can become infected with Trojans like Berbew in a number of ways: opening unknown e-mail attachments, running downloaded programs, using peer-to-peer file sharing programs.
Alert level: severe