544 entries found.
Displaying page 1
of 28.
Backdoor:Win32/Rbot
Updated on Mar 21, 2005
Backdoor:Win32/Rbot is a family of backdoor Trojans that allows attackers to control infected computers. After a computer is infected, the Trojan connects to a specific IRC server and joins a specific channel to receive commands from attackers. Commands can instruct the Trojan to spread to other computers by scanning for network shares with weak passwords, exploiting Windows vulnerabilities, and spreading through backdoor ports opened by other families of malicious software. The Trojan can also allow attackers to perform other backdoor functions, such as launching denial of service (DoS) attacks and retrieving system information from infected computers.
Alert level:
severe
Backdoor:Win32/Rbot.gen!G
Updated on Sep 05, 2008
Backdoor:Win32/Rbot.gen!G is a backdoor trojan that allows unauthorized access and control of an affected machine. This malware may also be able to spread in a number of different ways. Typically, the spreading mechanism is started manually by a remote attacker using backdoor functionality. Methods for spreading may include via Messenger applications, via weakly protected network shares, via vulnerability exploit, or via backdoors opened by other malware during previous system compromises.
A broad range of malware may be detected with this name, hence specific symptoms (such as filenames and registry modifications) may vary from instance to instance. However, this group of malware is likely to appear to be behaviorally similar.
Alert level:
severe
Backdoor:Win32/Gael.A
Updated on Aug 28, 2005
Backdoor:Win32/Gael.A is a backdoor Trojan that targets certain versions of Microsoft Windows. The Trojan is downloaded, installed, and executed by TrojanDownloader:Win32/Gael.A.
Alert level:
severe
Backdoor:Win32/Ginwui.A
Updated on May 26, 2006
Backdoor:Win32/Ginwui.A is a Trojan dropper that installs a backdoor and rootkit on impacted systems. Backdoor:Win32/Ginwui.A was initially discovered as a file named Shell32.exe that is dropped and executed by TrojanDropper:Win32/Starx.A. For details on TrojanDropper:Win32/Starx.A, see:
http://www.microsoft.com/security/encyclopedia/details.aspx?Name=TrojanDropper:Win32/Starx.A
Alert level:
severe
Backdoor:Win32/Berbew.AT
Updated on Apr 04, 2005
Backdoor:Win32/Berbew.AT is a Trojan that targets computers running Microsoft Windows 2000 or Windows XP. The Trojan installs silently on a computer. It can capture and send credit card and other personal information to a Web site. It can also download files from Web sites and run them on your computer.
Alert level:
severe
Backdoor:Win32/Berbew.AW
Updated on Apr 05, 2005
Backdoor:Win32/Berbew.AW is a Trojan that installs silently on computers running Microsoft Windows 2000 or Windows XP. It may download files from Web sites and run them on the target computer, and may gather and send personal information from an infected computer to a Web site.
Alert level:
severe
Backdoor:Win32/Samsteal.A
Updated on Jun 15, 2005
Backdoor:Win32/Samsteal.A is a backdoor Trojan that targets certain versions of Microsoft Windows. This Trojan collects data from a computer and can release the data to other computers using a backdoor, e-mail, and other file exchange methods. It is dropped by Backdoor:Win32/Samsteal.A.dr.
Alert level:
severe
Backdoor:Win32/Berbew.AZ
Updated on Nov 09, 2005
Backdoor:Win32/Berbew.AZ is a backdoor Trojan that retrieves locally cached passwords and passwords from active windows, and sends those passwords to a remote website.. Backdoor:Win32/Berbew.AZ also opens and monitors TCP ports for incoming transmissions.
Alert level:
severe
Backdoor:Win32/Itfast.A
Updated on Sep 22, 2009
Backdoor:Win32/Itfast.A is a trojan that installs Trojan:Win32/Alureon.BJ. Win32/Alureon.BJ is a component of Win32/Alureon - a family of data-stealing trojans. These trojans allow an attacker to intercept incoming and outgoing Internet traffic in order to gather confidential information such as user names, passwords, and credit card data.
Alert level:
severe
Backdoor:Win32/Rbot.A
Updated on Nov 29, 2004
This software threat is detected and removed by the Malicious Software Removal Tool. For more information, see the parent variant.
Alert level:
severe
Backdoor:Win32/Rbot.E
Updated on Nov 29, 2004
This software threat is detected and removed by the Malicious Software Removal Tool. For more information, see the parent variant.
Alert level:
severe
Backdoor:Win32/Rbot.K
Updated on Nov 29, 2004
This software threat is detected and removed by the Malicious Software Removal Tool. For more information, see the parent variant.
Alert level:
severe
Backdoor:Win32/Sdbot.A
Updated on Dec 03, 2004
Backdoor:Win32/Sdbot.A is a backdoor Trojan that allows an attacker to take control of an infected computer. When a computer is infected, the Trojan connects to an Internet Relay Chat (IRC) server and joins a channel in order to receive commands from the controlling attacker. These commands can instruct the Trojan to perform a number of different actions.
Alert level:
severe
Backdoor:Win32/Gaobot
Updated on Dec 21, 2004
Backdoor:Win32/Gaobot is family of worms that can spread across network connections by breaking weak passwords or by exploiting vulnerabilities described in Microsoft Security Bulletins MS03-001, MS03-007, or MS03-026. After a variant copies and runs itself on a remote computer, it connects to an IRC server to receive commands.
Alert level:
severe
Backdoor:Win32/Rbot.CZ
Updated on Jan 24, 2005
Backdoor:Win32/Rbot.CZ is a backdoor Trojan that connects to an IRC server to receive commands from remote attackers. Commands could include instructions to spread to other computers via open network shares or by exploit of a security vulnerability, or to launch a denial of service (DoS) attack against specified targets.
Alert level:
severe