![]() This worm drops the following copies of itself into the affected system: It may be unknowingly downloaded by a user while visiting malicious websites. This worm may be downloaded by other malware/grayware/spyware from remote sites. It logs a user's keystrokes to steal information.Ĭompromises system security, Steals information, Launches DoS/DDoS attacks tolen information may be used for profit by cybercriminals who may gain access to the information. ![]() It steals CD keys, serial numbers, and/or the application product IDs of certain software. It does the said routine to prevent users from reaching these sites at a given time. It launches certain flood attacks against target sites. It executes commands from a remote malicious user, effectively compromising the affected system. It exploits software vulnerabilities to propagate to other computers across a network. It uses certain lists of user names and passwords to access password-protected shared files. To get a one-glance comprehensive view of the behavior of this Worm, refer to the Threat Diagram shown below. This worm has received attention from independent media sources and/or other security firms. Propagates via network shares, Propagates via software vulnerabilities
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |