Skip to main content
Skip to main content
787 entries found. Displaying page 5 of 40.
Updated on Nov 27, 2006
Worm:Win32/Zotob.E is a network worm that targets computers running certain versions of Microsoft Windows. The worm spreads by exploiting the Windows Plug-and-Play vulnerability described in Microsoft Security Bulletin MS05-039. The worm has a backdoor component that connects to an IRC server from the infected computer to receive commands from attackers.
Alert level: severe
Updated on Jul 23, 2004
Win32/Korgo.O.worm is a network worm that targets computers running Microsoft Windows XP or Windows 2000 that do not have Microsoft Security Bulletin MS04-011 installed. The worm monitors TCP ports and opens a backdoor to allow unauthorized access to infected computers. A computer infected with this worm may crash and reboot unexpectedly.
Alert level: severe
Updated on Sep 19, 2004
Backdoor:Win32/Rbot.AF connects to an IRC server to receive commands from remote attackers. Commands could include instructions to spread to other computers via open network shares or by exploit of a security vulnerability, or to launch a denial of service (DoS) attack against specified targets.
 
Backdoor:Win32/Rbot.AF may be detected as Backdoor:Win32/Rbot!8A89. 
Alert level: severe
Updated on Oct 13, 2004
Backdoor:Win32/Rbot.AK is a backdoor Trojan that connects to an IRC server to receive commands from remote attackers. Commands could include instructions to spread to other computers via open network shares or by exploit of a security vulnerability, or to launch a denial of service (DoS) attack against specified targets.
Alert level: severe
Updated on Oct 27, 2004
Backdoor:Win32/Rbot.AN is a backdoor Trojan that connects to an IRC server to receive commands from remote attackers. Commands could include instructions to spread to other computers via open network shares or by exploit of a security vulnerability, or to launch a denial of service (DoS) attack against specified targets.
Alert level: severe
Updated on Nov 18, 2004
Backdoor:Win32/Rbot.BC is a backdoor Trojan that connects to an IRC server to receive commands from remote attackers. Commands could include instructions to spread to other computers via open network shares or by exploit of a security vulnerability, or to launch a denial of service (DoS) attack against specified targets.
Alert level: severe
Updated on Dec 02, 2004
Backdoor:Win32/Rbot.BR is a backdoor Trojan that connects to an IRC server to receive commands from remote attackers. Commands could include instructions to spread to other computers via open network shares or by exploit of a security vulnerability, or to launch a denial of service (DoS) attack against specified targets.
Alert level: severe
Updated on Jan 04, 2005
Backdoor:Win32/Rbot.CQ is a backdoor Trojan that connects to an IRC server to receive commands from remote attackers. Commands could include instructions to spread to other computers via open network shares or by exploit of a security vulnerability, or to launch a denial of service (DoS) attack against specified targets.
Alert level: severe
Updated on Feb 23, 2005
Backdoor:Win32/Rbot.DY is a backdoor Trojan that runs in the background, gathers software installation and computer configuration details, and connects to an IRC server to receive commands from remote attackers. Commands could include instructions to spread to other computers via open network shares or by exploit of a security vulnerability, or to launch a denial of service (DoS) attack against specified targets.
Alert level: severe
Updated on Mar 04, 2005
Backdoor:Win32/Rbot.EQ is a backdoor Trojan that runs in the background, gathers software installation and computer configuration details, and connects to an IRC server to receive commands from remote attackers. Commands could include instructions to spread to other computers via open network shares or by exploit of a security vulnerability, or to launch a denial of service (DoS) attack against specified targets.
Alert level: severe
Updated on Mar 17, 2005
Backdoor:Win32/Rbot.FO is a backdoor Trojan that runs in the background, gathers software installation and computer configuration details, and connects to an IRC server to receive commands from remote attackers. Commands could include instructions to spread to other computers via open network shares or by exploit of a security vulnerability, or to launch a denial of service (DoS) attack against specified targets.
Alert level: severe
Updated on Mar 21, 2005
Backdoor:Win32/Rbot is a family of backdoor Trojans that allows attackers to control infected computers. After a computer is infected, the Trojan connects to a specific IRC server and joins a specific channel to receive commands from attackers. Commands can instruct the Trojan to spread to other computers by scanning for network shares with weak passwords, exploiting Windows vulnerabilities, and spreading through backdoor ports opened by other families of malicious software. The Trojan can also allow attackers to perform other backdoor functions, such as launching denial of service (DoS) attacks and retrieving system information from infected computers.
Alert level: severe
Updated on Apr 06, 2005
Backdoor:Win32/Rbot.FV is a backdoor Trojan that runs in the background, gathers software installation and computer configuration details, and connects to an IRC server to receive commands from remote attackers. Commands could include instructions to spread to other computers via open network shares or by exploit of a security vulnerability, or to launch a denial of service (DoS) attack against specified targets.
Alert level: severe
Updated on Apr 13, 2005
Backdoor:Win32/Rbot.FY is a backdoor Trojan that runs in the background, gathers software installation and computer configuration details, and connects to an IRC server to receive commands from remote attackers. Commands could include instructions to spread to other computers via open network shares or by exploit of a security vulnerability, or to launch a denial of service (DoS) attack against specified targets.
Alert level: severe
Updated on Aug 30, 2005
Backdoor:Win32/Rbot.FN is a backdoor Trojan that runs in the background, gathers software installation and computer configuration details, and connects to an IRC server to receive commands from remote attackers. Commands could include instructions to spread to other computers via open network shares or by exploit of a security vulnerability, or to launch a denial of service (DoS) attack against specified targets.
Alert level: severe
Updated on Aug 14, 2006
Update: This threat has been renamed [URL]Backdoor:Win32/Mocbot.A.
 
Backdoor:Win32/Graweg.A is an IRC Trojan that connects to an IRC channel and awaits commands from remote attackers. When instructed, Backdoor:Win32/Graweg.A begins searching the local network for systems which have not yet applied the Microsoft Windows Server Service security patch described in Microsoft Security Bulletin MS06-040. The Trojan also includes the ability to send messages via AOL Instant Messenger (AIM) and ICQ. The exploit code used by Backdoor:Win32/Graweg.A is only effective against un-patched systems running Windows 2000. However, the Trojan can still infect patched versions of Windows 2000 and other Windows operating systems by means other than exploit. For example, Backdoor:Win32/Graweg.A could be distributed as an e-mail attachment, or a link to the Trojan could be sent to e-mail or AIM recipients.
 
Backdoor:Win32/Graweg.A may lower security settings on infected systems and allows the system to be used for nefarious purposes, such as launching a Denial of Service (DoS) attack against others. Backdoor:Win32/Graweg.A includes the ability to download other files, thus the Trojan could update its functionality or download additional malicious software to infected systems.
 
Backdoor:Win32/Graweg.A has been assigned CME ID 482 and will be detected by Microsoft as
Backdoor:Win32/Graweg.A!CME-482.
Alert level: severe
Updated on Aug 14, 2006
Update: This threat has been renamed Backdoor:Win32/Mocbot.A.
 
Backdoor:Win32/Graweg.B is an IRC Trojan that connects to an IRC channel and awaits commands from remote attackers. When instructed, Backdoor:Win32/Graweg.B begins searching the local network for systems which have not yet applied the Microsoft Windows Server Service security patch described in Microsoft Security Bulletin MS06-040. The Trojan also includes the ability to send messages via AOL Instant Messenger (AIM) and ICQ. The exploit code used by Backdoor:Win32/Graweg.B is only effective against un-patched systems running Windows 2000. However, the Trojan can still infect patched versions of Windows 2000 and other Windows operating systems by means other than exploit. For example, Backdoor:Win32/Graweg.B could be distributed as an e-mail attachment, or a link to the Trojan could be sent to e-mail or AIM recipients.
 
Backdoor:Win32/Graweg.B may lower security settings on infected systems and allows the system to be used for nefarious purposes, such as launching a Denial of Service (DoS) attack against others. Backdoor:Win32/Graweg.B includes the ability to download other files, thus the Trojan could update its functionality or download additional malicious software to infected systems.
 
Backdoor:Win32/Graweg.B has been assigned CME ID 762 and will be detected by Microsoft as
Backdoor:Win32/Graweg.B!CME-762.
Alert level: severe
Updated on Sep 07, 2006
Backdoor:Win32/Mocbot.A is an IRC trojan that connects to an IRC channel and awaits commands  from remote attackers. When instructed, Backdoor:Win32/Mocbot.A begins searching the local network for systems which have not yet applied the Microsoft Windows Server service security patch described in Microsoft Security Bulletin MS06-040. The trojan also includes the ability to send messages via AOL Instant Messenger (AIM) and ICQ.
 
The exploit code used by Backdoor:Win32/Mocbot.A is only effective against un-patched systems. The trojan can still infect patched versions of Windows by means other than exploit. For example,  Backdoor:Win32/Mocbot.A could be distributed as an e-mail attachment, or a link to the trojan could be sent to e-mail or AIM recipients.
 
Backdoor:Win32/Mocbot.A may lower security settings on infected systems and allows the system to be used for nefarious purposes, such as launching a denial of service (DoS) attack against others. Backdoor:Win32/Mocbot.A includes the ability to download other files, thus the trojan could update its functionality or download additional malicious software to infected systems.
 
Backdoor:Win32/Mocbot.A has been assigned CME ID 482 and will be detected by Microsoft as Backdoor:Win32/Mocbot.A!CME-482.
Alert level: severe
Updated on Sep 07, 2006
Update: This threat was originally detected as Backdoor:Win32/Graweg.B.
 
Backdoor:Win32/Mocbot.B is an IRC Trojan that connects to an IRC channel and awaits commands from remote attackers. When instructed, Backdoor:Win32/Mocbot.B begins searching the local network for systems which have not yet applied the Microsoft Windows Server Service security patch described in Microsoft Security Bulletin MS06-040. The Trojan also includes the ability to send messages via AOL Instant Messenger (AIM) and ICQ. The exploit code used by Backdoor:Win32/Mocbot.B is only effective against un-patched systems running Windows 2000. However, the Trojan can still infect patched versions of Windows 2000 and other Windows operating systems by means other than exploit. For example, Backdoor:Win32/Mocbot.B could be distributed as an e-mail attachment, or a link to the Trojan could be sent to e-mail or AIM recipients.
 
Backdoor:Win32/Mocbot.B may lower security settings on infected systems and allows the system to be used for nefarious purposes, such as launching a Denial of Service (DoS) attack against others. Backdoor:Win32/Mocbot.B includes the ability to download other files, thus the Trojan could update its functionality or download additional malicious software to infected systems.
 
Backdoor:Win32/Mocbot.B has been assigned CME ID 762 and will be detected by Microsoft as
Backdoor:Win32/Mocbot.B!CME-762.
Alert level: severe
Updated on Nov 27, 2006
Update: This threat has been renamed [URL]Backdoor:Win32/Mocbot.A.
 
Backdoor:Win32/Graweg.A is an IRC Trojan that connects to an IRC channel and awaits commands from remote attackers. When instructed, Backdoor:Win32/Graweg.A begins searching the local network for systems which have not yet applied the Microsoft Windows Server Service security patch described in Microsoft Security Bulletin MS06-040. The Trojan also includes the ability to send messages via AOL Instant Messenger (AIM) and ICQ. The exploit code used by Backdoor:Win32/Graweg.A is only effective against un-patched systems running Windows 2000. However, the Trojan can still infect patched versions of Windows 2000 and other Windows operating systems by means other than exploit. For example, Backdoor:Win32/Graweg.A could be distributed as an e-mail attachment, or a link to the Trojan could be sent to e-mail or AIM recipients.
 
Backdoor:Win32/Graweg.A may lower security settings on infected systems and allows the system to be used for nefarious purposes, such as launching a Denial of Service (DoS) attack against others. Backdoor:Win32/Graweg.A includes the ability to download other files, thus the Trojan could update its functionality or download additional malicious software to infected systems.
 
Backdoor:Win32/Graweg.A has been assigned CME ID 482 and will be detected by Microsoft as
Backdoor:Win32/Graweg.A!CME-482.
Alert level: severe