Malware -
H Activity Alert APT Attacks/Hacks BigBrother BotNet CERT Crime Cryptocurrency Exploit GHDB ICS Incident Malware MITRE Phishing Ransom Spam Vulnerebility List
H 2020 2019 Viry znalosti Programy Virus Calendar Malware Traffic Ransom Database Znalosti Programy Calendar Banking Mobil RAT Evolution
2021 | ||
Datum | Název | Info |
12.3.21 | Based on Tactics, Techniques, and Procedures (TTPs) the backdoor is believed to be developed by Chinese nation-state actors.The backdoor masquerades itself as polkit daemon. | |
12.3.21 | Trojan.Win64.HAFNIUM.A | This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. |
25.2.21 | Trojan.MacOS.SLISP.A | This Trojan may be unknowingly downloaded by a user while visiting malicious websites. |
25.2.21 | Ransom.MSIL.POVLSOM.THBAOBA | This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. |
12.2.21 | Ransom.MSIL.TESLACRYPT.THABGBA | This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It creates certain registry entries to disable applications related to security. |
6.2.21 | This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. | |
6.2.21 | This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. | |
6.2.21 | This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. | |
6.2.21 | This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It drops files as ransom note. | |
6.2.21 | This Ransomware may be dropped by other malware. | |
6.2.21 | This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It automatically executes files when a user opens a drive. | |
6.2.21 | This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. | |
6.2.21 | Win32/Filecoder.ODM is a trojan that encrypts files on fixed, removable and network drives. To decrypt files the user is requested to comply with given conditions in exchange for a password/instructions. | |
6.2.21 | This AutoIt-compiled malware downloads a coinminer in affected systems. This malware is distributed by cybercriminals by bundling it with a legitimate installer of the Zoom communication app. | |
6.2.21 | A Trojan horse program is a malware that is not capable of automatically spreading to other systems. Trojans are usually downloaded from the Internet and installed by unsuspecting users. | |
6.2.21 | Cybercriminals take advantage of the popularity of the Zoom messaging app. This backdoor is found in a fake Zoom installer. This is probably hosted on malicious or suspicious sites. | |
6.2.21 | This MANAGEX variant is a modular adware that is able to gather important information as a browser extension. | |
6.2.21 | This new Mirai variant exploits CVE-2020-10173, a vulnerability in Comtrend VR-3033 routers. Similar to earlier variants, this Mirai variant uses telnet and SSH brute-forcing techniques to attack vulnerable devices. | |
6.2.21 | This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. | |
6.2.21 | A Trojan horse program is a malware that is not capable of automatically spreading to other systems. Trojans are usually downloaded from the Internet and installed by unsuspecting users. | |
6.2.21 | This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. | |
6.2.21 | This Coinminer arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. | |
6.2.21 | This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. | |
6.2.21 | This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. | |
6.2.21 | This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. | |
6.2.21 | A Trojan horse program is a malware that is not capable of automatically spreading to other systems. Trojans are usually downloaded from the Internet and installed by unsuspecting users. | |
6.2.21 | This Coinminer arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. | |
6.2.21 | This Rootkit arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. | |
6.2.21 | This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. | |
6.2.21 | This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. | |
6.2.21 | This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. | |
6.2.21 | This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. | |
6.2.21 | This Coinminer arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. | |
6.2.21 | This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. | |
6.2.21 | This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. | |
6.2.21 | This Trojan may be dropped by other malware. | |
6.2.21 | This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be downloaded by other malware/grayware from remote sites. |