Latest Virus

Trojan.FakeAV!gen6 Targets Encrypted Files

10/21: Trojan.FakeAV!gen6 Targets Encrypted Files

Trojan.FakeAV!gen6 is a heuristic detection for files that may have been obfuscated or encrypted in order to conceal themselves from antivirus software.
10/20: VBS_PSYME.DMB Creates an MDAC Object
This malware creates a Microsoft Data Access Component (MDAC) object, then attempts to access a URL to download a file.
10/19: Bloodhound.Exploit.278 is Heuristic Detection
Bloodhound.Exploit.278 is a heuristic detection for files attempting to exploit the Microsoft GDI+ PNG File Integer Overflow Remote Code Execution Vulnerability.
10/16: Bloodhound.Exploit.277 is Heuristic Scheme
Bloodhound.Exploit.277 is a heuristic detection for files attempting to exploit the Microsoft GDI+ PNG File Processing Remote Code Execution Vulnerability (BID 36645).
10/16: Downloader.Ergrun Download Files to Hacked Computer
Downloader.Ergrun is a Trojan horse that may download files on to the compromised computer.
10/15: Troj/Agent-LGE is Spam-Driven Fake Anti-Virus
Troj/Agent-LGE is yet another take on spam-driven fake anti-virus infection techniques.
10/14: Bloodhound.Exploit.273 is Heuristic Detection
Bloodhound.Exploit.273 is a heuristic detection for files attempting to exploit the Microsoft GDI+ WMF File Processing Remote Code Execution Vulnerability.
10/14: Trojan.FakeAV!gen3 Targets Encrypted Files
Trojan.FakeAV!gen3 is a heuristic detection for files that may have been obfuscated or encrypted in order to conceal themselves from antivirus software.
10/13: Packed.Generic.258 Detects Encrypted Files
Packed.Generic.258 is a heuristic detection for files that may have been obfuscated or encrypted in order to conceal them from antivirus software.
10/12: SecurityTool Exaggerates Threats Reports
SecurityTool is a misleading application that may give exaggerated reports of threats on the computer.
10/12: Packed.Generic.257 Conceals from Antivirus Software
Packed.Generic.257 is a heuristic detection for files that may have been obfuscated or encrypted in order to conceal them from antivirus software.
10/9: Packed.Generic.257 Targets Encrypted Files
Packed.Generic.257 is a heuristic detection for files that may have been obfuscated or encrypted in order to conceal them from antivirus software.
10/8: W32.SillyFDC.BDC Modifies the Host File
W32.SillyFDC.BDC is a worm that spreads by copying itself to removable and shared drives. It also modifies the host file to redirect network traffic.
10/7: Troj/Sniffer-R "Sniffs" FTP Credentials
Troj/Sniffer-R is a malicious file that "sniffs" FTP credentials, meaning it monitors users' network traffic to steal and report users' FTP credentials to a remote site.
10/6: Trojan.FakeAV!gen2 is Heuristic Detection
Trojan.FakeAV!gen2 is a heuristic detection for files that may have been obfuscated or encrypted in order to conceal themselves from antivirus software.

Komentar