Spy.Win32.SecondEye

General description Type: Spyware Degree of destruction: Moderate Prevalence: Moderate Malware names: Spy.Win32.SecondEye (Padvish) Win32/Spy.SecondEye.A   What is spyware? This type of malware is used to steal organizational personal information and espionage purposes. With spyware installed on the system, the user’s information is under constant threat from the security point of view, and there is…

Trojan.VBS.Neoreklami

General Explanation Type: Trojan Degree of destruction: average Prevalence: High What is a Trojan? Trojans are malware types that introduce themselves as healthy and legal software and act similarly to practical and applicable software but cause many destructions to the system when executing. The downloaded software from the internet, placing HTML text, attaching it to…

Trojan.Android.SmsSpy.Sinab

General Explanation Type: Trojan Degree of destruction: average What is a Trojan? Trojans are malware types that introduce themselves as healthy and legal software and act similarly to practical and applicable software but cause many destructions to the system when executing. The downloaded software from the internet, placing HTML text, attaching it to an email,…

Exploit.Win32.CVE-2022-30190.a

General Explanation Type: Vulnerability Vulnerable Platform: Windows Vulnerable Versions: All Windows versions Patch release date: 14, June 2022   Vulnerable module: Microsoft Support Diagnostic Tool (MSDT) Vulnerability type: Remote Code Execution Risk Level: High (CVSS:3.1 7.8 / 7.0) What is a Vulnerability? In computer security, Vulnerability is a weak point in a platform that can be exploited by…

HackTool.Win32.APT- PS

Technical details 1.1 Modules and malware operation sequences This malware includes many modules, including executable programs and various scripts, each of which has its small task. The following is a list of malware files with a brief description of how they work. File Name Description HackTool.Win32.PS_Backdoor the malware Backdoor file is used to execute the…

Trojan.Win32.NetWire

General description Type: Trojan Degree of destruction: medium Prevalence: medium Malware names Trojan.Win32.NetWire.a (Padvish) Backdoor: Win32/Netwire.GG! MTB (Microsoft) A Variant Of Win32/Kryptik.HLLV (ESET-NOD32) What is a Trojan? Trojans are malware types that introduce themselves as healthy and legal software and act similarly to practical and applicable software but cause many destructions to the system when…

Hacktool.Win32.Xwo.a

General description Type: Hacktool Degree of destruction: High Prevalence: Low What is Hacktool? Hacktools are tools designed to facilitate intrusion. These tools can be used by a hacker to siphon data from the victim organization’s network. These tools are commonly used to retrieve the validation information of sensitive victim servers. For example, a hacker can…

Trojan.Win32.Andromeda

General Explanation Type: Trojan Degree of destruction: medium Prevalence: high Malware names • Trojan.Win32.Andromeda • Downloader.Win32.Andromeda What is a Trojan? Trojans are malware types that introduce themselves as healthy and legal software and act similarly to practical and applicable software but cause many destructions to the system when executing. The downloaded software from the internet,…

Implant.ARM.iLOBleed.a

  Download full report in English (PDF)  Download full report in Persian (PDF)  1 Technical Abstract HP servers provide a management module called iLO (a.k.a. Integrated Lights-Out), which turns on as soon as the power cable is connected, loading a full-blown proprietary operating system. This module has full access to all the firmware, hardware, software, and…