Worm.JS.Boxter

General Explanation Type: Worm Degree of destruction: high Prevalence: average Names of the malware: Worm.JS.Boxter.n Worm.Win32.Boxter.lnk What is the Worm? Computer worms such as Boxter are types of malware that are capable of reproduction. For permanence, worms set ways to maintain the infection in each system boot. The prominent feature of worms is in their…

Miner.Win32.Slytherin.n

General Explanation Type: Miner Degree of destruction: Average Prevalence: Average Used vulnerabilities: CVE-2019-0803 CVE-2017-0213 What is a Miner? A miner is a person or hardware that does mining or extracts Digital currencies. Bitcoin is a type of cryptocurrency. extracting bitcoin is a type of confirming information process which occurs in two different SHA256 hash levels.…

Adware.Android.HiddenApp.A

General Explanation Type: Adware Degree of destruction: average Prevalence: average What is adware? Adware is advertising malware that results in showing advertising or appearing multiple banners in your system and encourages you to buy products or use their services. Programmers of these types of malware, use to add relevant codes to notification send services to…

Spy.Android.Agent.Trv

General description Type: Spyware Degree of destruction: average Prevalence: average What is Spyware? By installing Spyware on your phone, the user’s data security is always under threat and each second, it is possible to be stolen and received by an unauthorized person. Usually, spyware is installed on the phone secretly and out of the user’s…

Rootkit.win32.Lojax

General Explanation Type: Rootkit Degree of destruction: average Prevalence: low Used tool: Computrace LoJack What is Rootkit? Rootkits will impact destructively on the OS kernel. These changes can hide many functions such as files, processes, Windows internal service, etc. Also, this malware will connect to the server and update its file without the user’s notice.…