trojan

NanoCore Trojan Is Protected In Memory From Being Killed Off















trojan

OpenSSH Distribution Trojaned




trojan

Mobile Phones be Acting as 'Trojan Horses' for Coronavirus

Mobile phones host cocktail of live germs, aiding spread of diseases and urging billions of users worldwide to decontaminate their devices daily, warned new study.




trojan

Trojan.JS.KOVCOREG.A

Over All Risk Rating : Low


This malware is part of the fileless botnet Novter distributed by the KovCoreG malvertising campaign.

This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the affected system. As of this writing, the said sites are inaccessible.

Read More




trojan

Trojan.JS.NODSTER.A

Over All Risk Rating : Low


This malware is part of the fileless botnet Novter that is delivered via the KovCoreG malvertising campaign.

This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be downloaded by other malware/grayware from remote sites.

Read More




trojan

Trojan.SH.KERBERDS.A

Over All Risk Rating : Low


This new version of KERBERDS, a cryptomining malware that uses an ld.so.preload-based rootkit for stealth, now hides CNC traffic in DNS TXT records.

This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

Read More




trojan

Trojan.JS.KOVCOREG.A

Over All Risk Rating : Low


This malware is part of the fileless botnet Novter distributed by the KovCoreG malvertising campaign.

This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the affected system. As of this writing, the said sites are inaccessible.

Read More




trojan

Trojan.JS.NODSTER.A

Over All Risk Rating : Low


This malware is part of the fileless botnet Novter that is delivered via the KovCoreG malvertising campaign.

This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be downloaded by other malware/grayware from remote sites.

Read More




trojan

Trojan.SH.KERBERDS.A

Over All Risk Rating : Low


This new version of KERBERDS, a cryptomining malware that uses an ld.so.preload-based rootkit for stealth, now hides CNC traffic in DNS TXT records.

This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

Read More




trojan

[ASAP] Carbon Nanotubes Modulate Activity of Cytotoxic Compounds via a Trojan Horse Mechanism

Chemical Research in Toxicology
DOI: 10.1021/acs.chemrestox.9b00370




trojan

What's Inside - Trojan Tingly Warmth Lubricant

What do sex dolls, caulking, and lotion have in common? They all contain active ingredients also found in Trojan's Tingly Warmth Lubricant. Find out what else is inside the slick sex aid.




trojan

The trojan horse: the growth of commercial sponsorship / by Garry Whannel and Deborah Philips

Online Resource




trojan

Mars in scorpio [manuscript] / by Kurt von Trojan

Von Trojan, Kurt, 1937-




trojan

The Lamentations of Zeno / Ilija Trojanow ; translated by Philip Boehm

Hayden Library - PT2682.R56 E4713 2016




trojan

[ASAP] Lyoprotectant Optimization for the Freeze-Drying of Receptor-Targeted Trojan Horse Liposomes for Plasmid DNA Delivery

Molecular Pharmaceutics
DOI: 10.1021/acs.molpharmaceut.0c00310




trojan

Ares, Aphrodite, Artemis, Apollo and Zeus Watching the Trojan War




trojan

Ares, Aphrodite, Artemis, Apollo and Zeus Watching the Trojan War