AB Consulting Group Srls | Consulenza assistenza informatica - Modena, Bologna, Padova, Ferrara    p.IVA 03633310366
   n.REA MO - 404857
   e.mail info@abconsultinggroup.eu
   p.e.c. abconsultinggroup@pec.it
   tel 0535-93261
   SDI M5UXCR1

   Disclaimer - Privacy

AB Consulting GROUP SRLs - mobile, cellulare, telefono
home consulenza assistenza sicurezza networking contatti wan ip: 3.234.245.125
vlAB - virtual LAB Zimbra soluzioni open source normativa privacy feed rss

controllo domini / IP es: google.it
teleassistenza remota per sistemi MS Windows teleassistenza remota per sistemi MAC OS
> teleassistenza remota Windows < > teleassistenza remota MAC <

rss informatica
Backdoor.Win64.ANCHOR.A, Backdoor.SH.SHELLBOT.AA, Backdoor.MSIL.REMCOS.AOJ, Coinminer.Linux.KERBERDS.A, Trojan.SH.KERBERDS.A, Trojan.JS.NODSTER.A, Trojan.JS.KOVCOREG.A, Rootkit.Linux.SKIDMAP.A, Coinminer.Win64.MALXMR.TIAOODBZ, Backdoor.Linux.BASHLITE.SMJC2, ELF_SETAG.SM, Backdoor.Perl.SHELLBOT.D, Backdoor.Linux.MIRAI.VWIQT, Ransom.MSIL.FREEZING.A, Backdoor.Perl.SHELLBOT.AB, Worm.Win32.BLASQUI.A.
trendmicro - top malware.

  • Backdoor.Win64.ANCHOR.A

    Over All Risk Rating : Low


    This is the Trend Micro detection for the backdoor installed by the PowerTrick post-exploitation toolkit believed to be developed by creators of Trickbot.

    This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

    It connects to certain websites to send and receive information.

    Read More

  • Backdoor.SH.SHELLBOT.AA

    Over All Risk Rating : Low


    This backdoor comes bundled with a Monero miner, both spread by a botnet. The techniques employed are reminiscent of the Outlaw hacking group that Trend Micro reported in November 2018.

    This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

    It connects to Internet Relay Chat (IRC) servers. It joins an Internet Relay Chat (IRC) channel.

    Read More

  • Backdoor.MSIL.REMCOS.AOJ

    Over All Risk Rating : Low


    This malware was seen delivered via malicious spam spoofing the brand DHL as the sender. It came as an .ISO attachment. It possibly is used for spearphishing activities.

    This Backdoor arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

    It executes commands from a remote malicious user, effectively compromising the affected system.

    Read More

  • Coinminer.Linux.KERBERDS.A

    Over All Risk Rating : Low


    This new version of KERBERDS, a known crypto-mining malware that uses an ld.so.preload-based rootkit for stealth, was seen propagating by telnet bruteforce attacks.

    This Coinminer arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

    It uses the system's central processing unit (CPU) and/or graphical processing unit (GPU) resources to mine cryptocurrency.

    Read More

  • Trojan.SH.KERBERDS.A

    Over All Risk Rating : Low


    This new version of KERBERDS, a cryptomining malware that uses an ld.so.preload-based rootkit for stealth, now hides CNC traffic in DNS TXT records.

    This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

    Read More

  • Trojan.JS.NODSTER.A

    Over All Risk Rating : Low


    This malware is part of the fileless botnet Novter that is delivered via the KovCoreG malvertising campaign.

    This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be downloaded by other malware/grayware from remote sites.

    Read More

  • Trojan.JS.KOVCOREG.A

    Over All Risk Rating : Low


    This malware is part of the fileless botnet Novter distributed by the KovCoreG malvertising campaign.

    This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

    It executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the affected system. As of this writing, the said sites are inaccessible.

    Read More

  • Rootkit.Linux.SKIDMAP.A

    Over All Risk Rating : Low


    This rootkit is used by Skidmap - a Linux malware - to hide its cryptocurrency-mining abilities.

    This Rootkit arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

    Read More

  • Coinminer.Win64.MALXMR.TIAOODBZ

    Over All Risk Rating : Low


    This miner figured in the fileless GhostMiner that uses WMI Objects. GhostMiner is known to kill competing other miner payloads.

    This Coinminer arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

    It uses the system's central processing unit (CPU) and/or graphical processing unit (GPU) resources to mine cryptocurrency.

    Read More

  • Backdoor.Linux.BASHLITE.SMJC2

    Over All Risk Rating : Low


    This backdoor is seen propagating via CVE-2018-18636, a cross-site scripting vulnerability affecting the wireless router D-Link DSL-2640T. This malware is capable of receiving commands to flood other systems.

    This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

    It executes commands from a remote malicious user, effectively compromising the affected system.

    Read More

  • ELF_SETAG.SM

    Over All Risk Rating : Low


    This malware is part of an attack chain that involves searching for exposed or publicly accessible Elasticsearch databases/servers. The malware would invoke a shell with an attacker-crafted search query with encoded Java commands.

    This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

    Read More

  • Backdoor.Perl.SHELLBOT.D

    Over All Risk Rating : Low


    This backdoor is downloaded and installed in systems via malicious URL. It is installed with a miner.

    This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be downloaded by other malware/grayware from remote sites.

    Read More

  • Backdoor.Linux.MIRAI.VWIQT

    Over All Risk Rating : Low


    IoT malware uses two different encryption routines for its strings and modified the magic number of UPX.

    This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

    It executes commands from a remote malicious user, effectively compromising the affected system.

    Read More

  • Ransom.MSIL.FREEZING.A

    Over All Risk Rating : Low


    This ransomware is one of the few ransomware families that is loaded and executed under the legitimate PowerShell executable. It also is one of the few that uses restart session manager to terminate processes that have associated files it tries to encrypt.

    This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

    It drops files as ransom note.

    Read More

  • Backdoor.Perl.SHELLBOT.AB

    Over All Risk Rating : Low


    This backdoor comes bundled with a Monero miner, both spread by a botnet. The techniques employed are reminiscent of the Outlaw hacking group that Trend Micro reported in November 2018.

    This Backdoor connects to Internet Relay Chat (IRC) servers. It joins an Internet Relay Chat (IRC) channel.

    Read More



scarica il software gratuito di teleassistenza

abconsultinggroup.eu | CMS - dbAdmin - webMail - google analytics - google webmaster

consulenza assistenza sicurezza networking soluzioni open source privacy contatti
modello di consulenza
aree di competenza
assistenza ai sistemi centrali
assistenza computer pc client / workstation
assistenza di rete
misure minime di sicurezza da adottare
misure idonee di sicurezza
interventi specialistici per la sicurezza e la gestione dei sistemi informatici
connessione alla rete internet
qualita' di servizio e sicurezza
autenticazione unificata
protezione e condivisione documentale
sistema di comunicazione centralizzata
sistema di difesa perimetrale
telelavoro
virtualizzazione
definizione
prodotti dedicati al business
best practice
Endian
Whois
ZIMBRA mail server
VMWare Zimbra Startup
codice in materia di protezione dei dati personali informativa telefonica
conuslenza informatica
intervento tecnico
incontro per conoscenza
partecipare a un corso gratuito
come ottenere un software gratuito open source
 
home - assistenza computer, zimbra mail server, firewall, enti pubblici, pubblica amministrazione, open sourceCopyright © 2020 abconsultinggroup.eu - All rights reserved p.IVA 03633310366 - N.REA MO - 404857 | E.mail info@abconsultinggroup.eu | Disclaimer | Privacy
Corso Giacomo Matteotti, 7/1 - 41034 Finale Emilia - MODENA