787 entries found.
Displaying page 6
of 40.
Backdoor:Win32/Graweg.B!CME-762
Updated on Nov 27, 2006
Update: This threat has been renamed Backdoor:Win32/Mocbot.A.
Backdoor:Win32/Graweg.B is an IRC Trojan that connects to an IRC channel and awaits commands from remote attackers. When instructed, Backdoor:Win32/Graweg.B begins searching the local network for systems which have not yet applied the Microsoft Windows Server Service security patch described in Microsoft Security Bulletin MS06-040. The Trojan also includes the ability to send messages via AOL Instant Messenger (AIM) and ICQ. The exploit code used by Backdoor:Win32/Graweg.B is only effective against un-patched systems running Windows 2000. However, the Trojan can still infect patched versions of Windows 2000 and other Windows operating systems by means other than exploit. For example, Backdoor:Win32/Graweg.B could be distributed as an e-mail attachment, or a link to the Trojan could be sent to e-mail or AIM recipients.
Backdoor:Win32/Graweg.B may lower security settings on infected systems and allows the system to be used for nefarious purposes, such as launching a Denial of Service (DoS) attack against others. Backdoor:Win32/Graweg.B includes the ability to download other files, thus the Trojan could update its functionality or download additional malicious software to infected systems.
Backdoor:Win32/Graweg.B has been assigned CME ID 762 and will be detected by Microsoft as
Backdoor:Win32/Graweg.B!CME-762.
Alert level:
severe
Win32/Sober.S@mm
Updated on Nov 30, 2006
Win32/Sober.S@mm is a mass-mailing worm that targets computers running certain versions of Microsoft Windows. The worm sends itself as an attachment to e-mail addresses found on the infected computer. The worm runs when the user opens the attachment.
Alert level:
severe
Backdoor:Win32/Mocbot.B!CME-762
Updated on Dec 08, 2006
Update: This threat was originally detected as Backdoor:Win32/Graweg.B.
Backdoor:Win32/Mocbot.B is an IRC Trojan that connects to an IRC channel and awaits commands from remote attackers. When instructed, Backdoor:Win32/Mocbot.B begins searching the local network for systems which have not yet applied the Microsoft Windows Server Service security patch described in Microsoft Security Bulletin MS06-040. The Trojan also includes the ability to send messages via AOL Instant Messenger (AIM) and ICQ. The exploit code used by Backdoor:Win32/Graweg.B is only effective against un-patched systems running Windows 2000. However, the Trojan can still infect patched versions of Windows 2000 and other Windows operating systems by means other than exploit. For example, Backdoor:Win32/Mocbot.B could be distributed as an e-mail attachment, or a link to the Trojan could be sent to e-mail or AIM recipients.
Backdoor:Win32/Mocbot.B may lower security settings on infected systems and allows the system to be used for nefarious purposes, such as launching a Denial of Service (DoS) attack against others. Backdoor:Win32/Mocbot.B includes the ability to download other files, thus the Trojan could update its functionality or download additional malicious software to infected systems.
Backdoor:Win32/Mocbot.B has been assigned CME ID 762 and will be detected by Microsoft as
Backdoor:Win32/Mocbot.B!CME-762.
Alert level:
severe
Worm:Win32/Sober.V@mm!CME157
Updated on Jan 18, 2007
Win32/Sober.V@mm!CME-157 is a mass-mailing worm. The worm spreads by sending a copy of itself as an e-mail attachment to e-mail addresses that it gathers from certain files on the host computer. The worm runs on when the user opens the e-mail attachment.
Alert level:
severe
Win32/Sober.V@mm
Updated on Jan 25, 2007
Win32/Sober.V@mm is a mass-mailing worm. The worm spreads by sending a copy of itself as an e-mail attachment to e-mail addresses that it gathers from certain files on the host computer. The worm runs on when the user opens the e-mail attachment.
Alert level:
severe
Worm:Win32/Sober_V@mm.dr!CME157
Updated on Jan 25, 2007
Win32/Sober.V@mm is a mass-mailing worm. The worm spreads by sending a copy of itself as an e-mail attachment to e-mail addresses that it gathers from certain files on the host computer. The worm runs on when the user opens the e-mail attachment.
Alert level:
severe
Win32/Sober.V@mm.dr
Updated on Jan 25, 2007
Win32/Sober.V@mm is a mass-mailing worm. The worm spreads by sending a copy of itself as an e-mail attachment to e-mail addresses that it gathers from certain files on the host computer. The worm runs on when the user opens the e-mail attachment.
Alert level:
severe
Worm:Win32/Culler.D
Updated on May 21, 2007
Worm:Win32/Culler.D is an instant messaging worm that spreads by sending links to copies of itself via MSN Messenger. Worm:Win32/Culler.D continually terminates processes related to Task Manager, Registry Editor and System Restore.
Alert level:
severe
Backdoor:Win32/Rbot!8A89
Updated on Jun 18, 2007
Backdoor:Win32/Rbot!8A89 is a backdoor Trojan that connects to an IRC server to receive commands from remote attackers. Commands could include instructions to spread to other computers via open network shares or by exploit of a security vulnerability, or to launch a denial of service (DoS) attack against specified targets.
Backdoor:Win32/Rbot!8A89 may be detected as Backdoor:Win32/Rbot.AF.
Alert level:
severe
Backdoor:Win32/Rbot.JF
Updated on Jul 21, 2010
Backdoor:Win32/Rbot.JF is a member of Win32/Rbot - a large family of IRC-controlled backdoors that allow unauthorized access and control of an affected computer. Using this backdoor, an attacker can perform a large number of different actions on an affected computer, including downloading and executing arbitrary files, stealing sensitive information and spreading to other computers using various methods.
Alert level:
severe
Worm:Win32/Randex.FI
Updated on Jul 14, 2004
Win32/Randex.FI.worm is a network worm that targets computers running certain versions of Microsoft Windows. The worm attempts to spread by randomly scanning IP addresses for writeable network shares with weak passwords. The worm has backdoor capabilities that allow attackers to control the infected computer through an IRC channel. The worm also restricts some security applications from running on infected computers.
Alert level:
severe
Worm:Win32/Zindos.A
Updated on Jul 27, 2004
Win32/Zindos.A.worm is a network worm that targets computers running Microsoft Windows 9x, Windows ME, Windows NT, Windows 2000, or Windows XP. The worm spreads through a backdoor created by the mass-mailer worm Win32/Mydoom.O@mm. Win32/Zindos.A.worm performs a denial of service (DoS) attack against www.microsoft.com.
Alert level:
severe
Worm:Win32/Msblast.B
Updated on Sep 13, 2004
Win32/Msblast.B is a network worm that can spread to a computer running Microsoft Windows 2000 and Windows XP that does not have Security Update MS03-026 or MS03-039 installed. The worm performs a denial of service (DoS) attack against windowsupdate.com, if the day of the month is greater than 15 or the month is greater than 8.
Alert level:
severe
Worm:Win32/Msblast.C
Updated on Sep 13, 2004
Win32/Msblast.C is a network worm that can spread to a computer running Microsoft Windows 2000 and Windows XP that does not have Security Update MS03-026 or MS03-039 installed. It performs a denial of service (DoS) attack against windowsupdate.com, if the day of the month is greater than 15 or the month is greater than 8.
Alert level:
severe
Worm:Win32/Msblast.D
Updated on Sep 13, 2004
Win32/Msblast.D is a network worm that can spread to a computer running Microsoft Windows 2000 and Windows XP that does not have Security Update MS03-026 or MS03-039 installed. It performs a denial of service (DoS) attack against windowsupdate.com, if the day of the month is greater than 15 or the month is greater than 8.
Alert level:
severe
Worm:Win32/Msblast.E
Updated on Sep 13, 2004
Win32/Msblast.E is a network worm that can spread to a computer running Microsoft Windows 2000 and Windows XP that does not have Security Update MS03-026 or MS03-039 installed. It performs a denial of service (DoS) attack against kimble.org, if the day of the month is greater than 15 or the month is greater than 8.
Alert level:
severe
Worm:Win32/Msblast.F
Updated on Sep 13, 2004
Win32/Msblast.F is a network worm that can spread to a computer running Microsoft Windows 2000 and Windows XP that does not have Security Update MS03-026 or MS03-039 installed. It performs a denial of service (DoS) attack against tuiasi.ro, if the day of the month is greater than 15 or the month is greater than 8.
Alert level:
severe
Worm:Win32/Msblast.G
Updated on Sep 13, 2004
Win32/Msblast.G is a network worm that can spread to a computer running Microsoft Windows 2000 and Windows XP that does not have Security Update MS03-026 installed. It performs a denial of service (DoS) attack against windowsupdate.com, if the day of the month is greater than 15 or if the month is greater than 8.
Alert level:
severe
Worm:Win32/Msblast.H
Updated on Sep 14, 2004
Win32/Msblast.H is a network worm that can spread to a computer running Microsoft Windows 2000 and Windows XP that does not have Security Update MS03-026 or MS03-039 installed. It performs a denial of service (DoS) attack against windowsupdate.com, if the day of the month is greater than 15 or the month is greater than 8.
Alert level:
severe
Worm:Win32/Msblast.A
Updated on Nov 09, 2004
Win32/Msblast.A is a network worm that can spread to a computer running Microsoft Windows 2000 or Windows XP that does not have Security Update MS03-026 or MS03-039 installed. It performs a denial of service (DoS) attack against windowsupdate.com if the day of the month is greater than 15 or the month is September or later.
Alert level:
severe