trojan

Trojany mobilne w Polsce w 2021 r.

Rynek urządzeń mobilnych z roku na rok powiększa się, a w raz z nim liczba ataków na urządzenia mobilne. W 2021 r. do zespołu zespołu CERT Polska trafiło ponad 17,5 tys. zgłoszeń dotyczących szkodliwych aplikacji na systemy operacyjne Android.




trojan

Trojan bankowy Hydra znowu w natarciu – nowa kampania

Ostrzegamy - szkodliwe oprogramowanie z rodziny Hydra ponownie aktywne. Jako cel obiera dane logowania do aplikacji bankowych na systemach Android.




trojan

Mutant Bagle Trojan Shutting Down Anti-Virus Software




trojan

SteelFox Trojan

What kind of malware is SteelFox?

SteelFox is a trojan – specifically, a malware bundle with its primary components including a data stealer and cryptocurrency miner. SteelFox infiltrates systems through a sophisticated infection chain.

This trojan has been around since at least 2023, and it was noted being proliferated under the guise of illegal software activation tools ("cracks"). The SteelFox campaign is active worldwide, with the most infections registered in Brazil, China, Russia, Mexico, United Arab Emirates, Egypt, Algeria, Vietnam, India, and Sri Lanka.





trojan

Trojan.PS1.POWLOAD.JKP

Threat type: Trojan

Aliases: N/A

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: Medium

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This POWLOAD variant is seen distributed via spam. The spam campaign is in Italian and lures users to click by using COVID-19 in its subject.

This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.




trojan

Trojan.Win32.MOOZ.THCCABO

Threat type: Trojan

Aliases:

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: Medium

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Medium

Overview:

This AutoIt-compiled malware downloads a coinminer in affected systems. This malware is distributed by cybercriminals by bundling it with a legitimate installer of the Zoom communication app.

This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.




trojan

Trojan.JS.MANAGEX.A

Threat type: Trojan

Aliases:

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: Low

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Medium

Overview:

This MANAGEX variant is a modular adware that is able to gather important information as a browser extension.

This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It connects to certain websites to send and receive information. However, as of this writing, the said sites are inaccessible.




trojan

Trojan.MSIL.SUPERNOVA.A

Threat type: Trojan

Aliases: MSIL/Agent.5676!tr (FORTINET)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: High

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user accesses the said website.

It executes commands from a remote malicious user, effectively compromising the affected system.




trojan

Trojan.INF.HIDDENTEAR.THAOGBA

Threat type: Trojan

Aliases: INF/Agent.J trojan (NOD32)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: Low

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It automatically executes files when a user opens a drive.




trojan

Trojan.Win64.COMBACKER.YABA-A

Threat type: Trojan

Aliases: Trojan.Win64.Agent (IKARUS), Trojan:Win64/Comebacker.A!dha (MICROSOFT)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: Medium

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.




trojan

Trojan.MacOS.SLISP.A

Threat type: Trojan

Aliases: Trojan.OSX.SilverSparrow (IKARUS)

Platforms: OSX

Overall Risk Rating: Low

Damage Potential: Medium

Distribution Potential: Low

Reported Infection: Low

Information Exposure: High

Overview:

This Trojan may be unknowingly downloaded by a user while visiting malicious websites.




trojan

Trojan.PS1.BOXTER.A

Threat type: Trojan

Aliases:

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: Medium

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Medium

Overview:

This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.




trojan

Trojan.Win64.HAFNIUM.A

Threat type: Trojan

Aliases:

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: Medium

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.




trojan

TrojanSpy.MSIL.REDLINESTEALER.YXBDM

Threat type: Trojan Spy

Aliases: MSIL/Kryptik.AAHQ!tr(FORTINET); Trj/GdSda.A(PANDA)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: Medium

Distribution Potential: Low

Reported Infection: Low

Information Exposure: High

Overview:

This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It executes commands from a remote malicious user, effectively compromising the affected system. It connects to a website to send and receive information.




trojan

TrojanSpy.MSIL.REDLINESTEALER.YXBDN

Threat type: Trojan Spy

Aliases: a variant of MSIL/Kryptik.AAHN trojan(NOD32); PWS-FCXD!F291EAD13EAD(NAI)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: Medium

Distribution Potential: Low

Reported Infection: Low

Information Exposure: High

Overview:

This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It executes commands from a remote malicious user, effectively compromising the affected system. It connects to a website to send and receive information.




trojan

Trojan.X97M.PANDASTEAL.THDABBA

Threat type: Trojan

Aliases: HEUR:Trojan-Downloader.MSOffice.Agent.gen (KASPERSKY)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: Medium

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This is the Trend Micro detection for macros that drop the cryptocurrency wallet stealer known as Panda stealer.

This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.




trojan

Trojan.Win32.CVE20188120.E

Threat type: Trojan

Aliases: Exploit:Win32/CVE-2018-8120.A (MICROSOFT)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: High

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It takes advantage of certain vulnerabilities.




trojan

Trojan.Win32.CVE20190808.A

Threat type: Trojan

Aliases: Win32:CVE-2019-0808-K [Expl] (AVAST)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: High

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It takes advantage of certain vulnerabilities.




trojan

Trojan.W97M.CVE202140444.A

Threat type: Trojan

Aliases: HEUR:Exploit.MSOffice.Agent.gen (KASPERSKY)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: High

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It takes advantage of certain vulnerabilities.




trojan

Trojan.MSIL.WHISPERGATE.YXCAQ

Threat type: Trojan

Aliases: DoS:Win32/WhisperGate.I!dha (MICROSOFT)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: Medium

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.




trojan

Trojan.Win32.WHISPERGATE.YXCAX

Threat type: Trojan

Aliases: DoS:Win32/WhisperGate.M (MICROSOFT)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: High

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It executes then deletes itself afterward.




trojan

Trojan.Win32.KILLMBR.YECCA

Threat type: Trojan

Aliases: Win32/KillMBR.NHQ trojan (NOD32)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: High

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.




trojan

Trojan.W97M.EMOTET.SMI

Threat type: Trojan

Aliases: HEUR:Trojan.Script.Generic (KASPERSKY); TrojanDownloader:O97M/Emotet.S!MTB (MICROSOFT)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: Medium

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This is a generic detection for all cases and instances of Emotet.

This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.




trojan

Science for All | What are Trojan asteroids?

The Hindu’s weekly Science for All newsletter explains all things Science, without the jargon.





trojan

Stuxnet-Like Duqu Trojan Hits Iranian Systems





trojan

Could spot fixing be our Trojan Horse?


Corruption in India has attained humongous proportions despite continual but largely erratic movements since independence to tackle this menace. Shankar Jaganathan ponders on whether the recent betting scandal in cricket could catalyse an effective outcome in the fight against political corruption.




trojan

"WgaUtilAcc" User Possible Trojan




trojan

Spyware or Trojan...2-3 months and it comes back




trojan

Windows Security Essential found some trojans..




trojan

30% off GridinSoft Trojan Killer - Ends July 3rd, 2014




trojan

50% discount off a 2 years license of Trojan Killer - Ends August 10, 2014




trojan

Former Trojans star Alex Danson reaches half-centrury of GB goals

FORMER Trojans hockey star Alex Danson has reached a half-century of goals for Great Britain.




trojan

Amy Sheehan returns to Trojans in England Hockey Western Conference

HOT shot Amy Sheehan has returned to her old Stoneham haunts to lead Trojans’ attack in the Investec England Hockey Western Conference.




trojan

New USC baseball coach Jason Gill hopes to return Trojans to glory days

New USC baseball coach Jason Gill is set to takeover a Trojan program that has not seen postseason play since 201`5.




trojan

USC guard Elijah Weaver enters transfer portal, says goodbye to Trojans

USC sophomore guard Elijah Weaver entered the NCAA's transfer portal on Tuesday, saying goodbye to the Trojans in an Instagram post.




trojan

UCLA's offense kicks into low, low gear in loss to Trojans

Almost nothing worked, hurting UCLA's NCAA tournament chances and likely leaving the Bruins in need of at least one victory in the Pac-12 tournament next week.





trojan

Trojan Milk

Infant formula manufacturers were made pariah in the 70s, because of their marketing practices - this lead to “The Code”, adopted by the WHO, which set out clear guidelines about what those practices should be. Now an investigation on bmj.com by Chris Van Tulleken, honorary senior lecturer at University College London, examines the practices...





trojan

Facebook App Flaws Create Trojan Download Risk




trojan

Skype Trojan Can Log VoIP Conversations







trojan

Dridex Trojan Updated With AtomBombing Evasion Techniques