Достапно на / Dispozicion në:
македонски (Macedonian)
Faqja është në ndërtim e sipër.
Së shpejti:
- shërbimi publik për verifikim të IP adresës
- informacione për organizatat dhe operatorët
Adresa juaj IP publike është 3.238.118.27 wpDataTable with provided ID not found!]
МАЛВЕР | ОПИС | ПОВЕЌЕ ИНФОРМАЦИИ | BROJ |
---|---|---|---|
Gamarue | This malware allows attackers to remotely access compromised devices. It’s spread via spam and removable drives. | https://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?Name=Win32%2fGamarue | 6.585 |
Powmet | This malware is known by it’s main characteristic of being file-less. It was discovered in August 2017. It can install a backdoor onto the infected systems. It also reinstalls itself by using an autostart registry. | https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/js_powmet.de, https://blog.trendmicro.com/trendlabs-security-intelligence/look-js_powmet-completely-fileless-malware/ | 2.157 |
HiddenAds | This program is identified by several antivirus vendors as a potentially unwanted program (PUP). These programs are typically installed as bundled software from untrusted sources or directly by other pre-existing PUP or malware. The classification of PUP means that it contains capabilities that fulfill the potentially unwanted criteria, such as installing other software, displaying unwanted ads, or making its uninstallation difficult. | https://securitynews.sonicwall.com/xmlpost/using-some-photo-editing-apps-on-android-might-get-you-infected-with-adware/, https://www.virustotal.com/gui/file/94135a9790606b5f3257c93883e37ba30cf63865fd5dbc3325ef57259862e43b/detection, https://www.virustotal.com/gui/file/ea43d7a22d25819e681acd797353d1fe180c970a8d6637f33c06618fc5dfbf6e/detection, https://www.virustotal.com/gui/file/7d5ae70ce0c3c8b45bfaf3084fd11645b94b9ef9bc03eec96c9665f5fbf8ca74/detection | 1.633 |
Bandoo | This potentially unwanted application (PUA) can install programs that automatically executes during startup, change the “new tab page” settings, install browser extensions (used to inject ads, add toolbars, or change browser configurations), edit system host files (used to redirect or disable access to specific websites), and disable real security products, and prevent software updates. | https://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?Name=PUA:Win32/Bandoo, https://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?Name=PUA%3AWin32%2FSuiteSearch&ThreatID=213933, https://www.hybrid-analysis.com/sample/cb464ac55dbdc665ff299944402f1b68217b22dd661a3b9640b01a5d38a64402?environmentId=100 | 1.497 |
Necurs | This malware steals information, disables security programs, and is often installed in conjunction with other malware. | https://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?Name=Trojan:Win32/Necurs, https://web.archive.org/web/20170120181644/https://www.symantec.com/security_response/writeup.jsp?docid=2012-121212-2802-99 | 1.470 |
ArrkiiSDK | Though these kinds of Android SDK are mainly used to display ads, this has malicious capabilities, such as advertising fraud and silently installing applications. | https://vms.drweb.ru/virus/?i=16358816, https://vms.drweb-av.pl/virus/?i=16956973, https://www.virustotal.com/gui/file/e46792703b7596f84ac9e3bdbe6257cdc1674557752eed6c6436db94573722bc/details | 1.445 |
Sality | This botnet attempts to connect to its Command and Control server (C&C or C2 server) by using trojan malware techniques to infect machines. Once a device is compromised, this botnet is capable of collecting and uploading data, installing new files or other malware, and modifying or deleting files. | https://web.archive.org/web/20200304125518/https://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?Name=Win32%2FSality | 1.420 |
Gamut | The subject of the emails sent by this spambot are typically related to employment opportunities. | https://web.archive.org/web/20151023223155/http://www.symantec.com/security_response/writeup.jsp?docid=2014-031006-1618-99&tabid=2, https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/gamut-spambot-analysis/ | 1.307 |
Spam Bot | Spam that’s indicative of a malware infection has been observed to be coming from this network, but the exact infection could not be identified. | https://web.archive.org/web/20200120233501/https://www.pcworld.com/article/170546/how_to_clean_bots.html | 1.242 |
CrossRider | This malware was created using the CrossRider browser extension tool. | https://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?Name=PUA%3aWin32%2fCrossRider | 1.218 |