AB Consulting di Andrea Balboni | Consulenza assistenza informatica, reti, sicurezza, DPS, privacy    p.IVA 02768260362
   e.mail info@andreabalboni.com
   info@pec.andreabalboni.com
   fax 0535-93741

   Disclaimer - Privacy

AB Consulting GROUP - mobile, cellulare, telefono
skype ab_consulting

rss informatica corsi gratuiti antivirus free entertainment laboratorio informatico wan ip: 3.236.232.99
home consulenza assistenza sicurezza networking
VMWare Zimbra soluzioni open source normativa privacy contatti
 
controllo domini / IP es: google.it
teleassistenza remota per sistemi MS Windows teleassistenza remota per sistemi MAC OS
> teleassistenza remota Windows < > teleassistenza remota MAC <

rss informatica
Trojan.W97M.CVE202140444.A, Ransom.Win32.LOCKBIT.YEBGW, Ransom.MSIL.CHAOS.A, Ransom.Win32.BLACKMATTER.THGOCBA, Ransom.Win32.SODINOKIBI.YABGC, Trojan.Win32.CVE20188120.E, Trojan.Win32.CVE20190808.A, Trojan.X97M.PANDASTEAL.THDABBA, TrojanSpy.MSIL.REDLINESTEALER.YXBDM, TrojanSpy.MSIL.REDLINESTEALER.YXBDN, Ransom.Win64.ASTROLOCKER.THCBDBA, Ransom.Win32.DEARCRY.THCABBA, Trojan.Win64.HAFNIUM.A, Trojan.PS1.BOXTER.A, Trojan.MacOS.SLISP.A, Ransom.MSIL.POVLSOM.THBAOBA.
trendmicro - top malware.

  • Trojan.W97M.CVE202140444.A

    Threat type: Trojan

    Aliases: HEUR:Exploit.MSOffice.Agent.gen (KASPERSKY)

    Platforms: Windows

    Overall Risk Rating: Low

    Damage Potential: High

    Distribution Potential: Low

    Reported Infection: Low

    Information Exposure: Low

    Overview:

    This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

    It takes advantage of certain vulnerabilities.

  • Ransom.Win32.LOCKBIT.YEBGW

    Threat type: Ransomware

    Aliases: Ransom:Win32/Lockbit.AA!MTB (MICROSOFT); W32/Lockbit.C2F8!tr.ransom (FORTINET)

    Platforms: Windows

    Overall Risk Rating: Low

    Damage Potential: High

    Distribution Potential: Low

    Reported Infection: Low

    Information Exposure: Low

    Overview:

    This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

    It drops files as ransom note. It avoids encrypting files with the following file extensions.

  • Ransom.MSIL.CHAOS.A

    Threat type: Ransomware

    Aliases: HEUR:Trojan.MSIL.Fsysna.gen (Kaspersky);

    Platforms: Windows

    Overall Risk Rating: Low

    Damage Potential: High

    Distribution Potential: Low

    Reported Infection: Low

    Information Exposure: Low

    Overview:

    This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

    It encrypts files found in specific folders.

  • Ransom.Win32.BLACKMATTER.THGOCBA

    Threat type: Ransomware

    Aliases: Trojan-Ransom.BlackMatter (IKARUS)

    Platforms: Windows

    Overall Risk Rating: Low

    Damage Potential: High

    Distribution Potential: Low

    Reported Infection: Low

    Information Exposure: Medium

    Overview:

    This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

    It drops files as ransom note. It avoids encrypting files with the following file extensions.

  • Ransom.Win32.SODINOKIBI.YABGC

    Threat type: Ransomware

    Aliases: N/A

    Platforms: Windows

    Overall Risk Rating: Low

    Damage Potential: High

    Distribution Potential: Low

    Reported Infection: Low

    Information Exposure: Medium

    Overview:

    This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be dropped by other malware.

    It drops files as ransom note. It avoids encrypting files with the following file extensions.

  • Trojan.Win32.CVE20188120.E

    Threat type: Trojan

    Aliases: Exploit:Win32/CVE-2018-8120.A (MICROSOFT)

    Platforms: Windows

    Overall Risk Rating: Low

    Damage Potential: High

    Distribution Potential: Low

    Reported Infection: Low

    Information Exposure: Low

    Overview:

    This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

    It takes advantage of certain vulnerabilities.

  • Trojan.Win32.CVE20190808.A

    Threat type: Trojan

    Aliases: Win32:CVE-2019-0808-K [Expl] (AVAST)

    Platforms: Windows

    Overall Risk Rating: Low

    Damage Potential: High

    Distribution Potential: Low

    Reported Infection: Low

    Information Exposure: Low

    Overview:

    This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

    It takes advantage of certain vulnerabilities.

  • Trojan.X97M.PANDASTEAL.THDABBA

    Threat type: Trojan

    Aliases: HEUR:Trojan-Downloader.MSOffice.Agent.gen (KASPERSKY)

    Platforms: Windows

    Overall Risk Rating: Low

    Damage Potential: Medium

    Distribution Potential: Low

    Reported Infection: Low

    Information Exposure: Low

    Overview:

    This is the Trend Micro detection for macros that drop the cryptocurrency wallet stealer known as Panda stealer.

    This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

  • TrojanSpy.MSIL.REDLINESTEALER.YXBDM

    Threat type: Trojan Spy

    Aliases: MSIL/Kryptik.AAHQ!tr(FORTINET); Trj/GdSda.A(PANDA)

    Platforms: Windows

    Overall Risk Rating: Low

    Damage Potential: Medium

    Distribution Potential: Low

    Reported Infection: Low

    Information Exposure: High

    Overview:

    This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

    It executes commands from a remote malicious user, effectively compromising the affected system. It connects to a website to send and receive information.

  • TrojanSpy.MSIL.REDLINESTEALER.YXBDN

    Threat type: Trojan Spy

    Aliases: a variant of MSIL/Kryptik.AAHN trojan(NOD32); PWS-FCXD!F291EAD13EAD(NAI)

    Platforms: Windows

    Overall Risk Rating: Low

    Damage Potential: Medium

    Distribution Potential: Low

    Reported Infection: Low

    Information Exposure: High

    Overview:

    This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

    It executes commands from a remote malicious user, effectively compromising the affected system. It connects to a website to send and receive information.

  • Ransom.Win64.ASTROLOCKER.THCBDBA

    Threat type: Ransomware

    Aliases: Win64/Filecoder.CI trojan (Nod32), Trojan-Ransom.FileCrypter (Ikarus)

    Platforms: Windows

    Overall Risk Rating: Low

    Damage Potential: High

    Distribution Potential: Low

    Reported Infection: Low

    Information Exposure: Low

    Overview:

    This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

    It executes then deletes itself afterward.

    It drops files as ransom note. It avoids encrypting files with the following file extensions.

  • Ransom.Win32.DEARCRY.THCABBA

    Threat type: Ransomware

    Aliases: Ransom:Win32/DoejoCrypt.A (MICROSOFT)

    Platforms: Windows

    Overall Risk Rating: Low

    Damage Potential: High

    Distribution Potential: Low

    Reported Infection: Low

    Information Exposure: Low

    Overview:

    This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

  • Trojan.Win64.HAFNIUM.A

    Threat type: Trojan

    Aliases:

    Platforms: Windows

    Overall Risk Rating: Low

    Damage Potential: Medium

    Distribution Potential: Low

    Reported Infection: Low

    Information Exposure: Low

    Overview:

    This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

  • Trojan.PS1.BOXTER.A

    Threat type: Trojan

    Aliases:

    Platforms: Windows

    Overall Risk Rating: Low

    Damage Potential: Medium

    Distribution Potential: Low

    Reported Infection: Low

    Information Exposure: Medium

    Overview:

    This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

  • Trojan.MacOS.SLISP.A

    Threat type: Trojan

    Aliases: Trojan.OSX.SilverSparrow (IKARUS)

    Platforms: OSX

    Overall Risk Rating: Low

    Damage Potential: Medium

    Distribution Potential: Low

    Reported Infection: Low

    Information Exposure: High

    Overview:

    This Trojan may be unknowingly downloaded by a user while visiting malicious websites.



scarica il software gratuito di teleassistenza

eabalboni.com | CMS - webMail - google analytics - google webmaster

consulenza assistenza sicurezza networking soluzioni open source privacy contatti
modello di consulenza
aree di competenza
assistenza ai sistemi centrali
assistenza computer pc client / workstation
assistenza di rete
misure minime di sicurezza da adottare
misure idonee di sicurezza
interventi specialistici per la sicurezza e la gestione dei sistemi informatici
connessione alla rete internet
qualita' di servizio e sicurezza
autenticazione unificata
protezione e condivisione documentale
sistema di comunicazione centralizzata
sistema di difesa perimetrale
telelavoro
virtualizzazione
definizione
prodotti dedicati al business
best practice
Endian
Whois
ZIMBRA mail server
VMWare Zimbra Startup
codice in materia di protezione dei dati personali informativa telefonica
conuslenza informatica
intervento tecnico
incontro per conoscenza
partecipare a un corso gratuito
come ottenere un software gratuito open source
 
home - assistenza computer, zimbra mail server, firewall, enti pubblici, pubblica amministrazione, open sourceCopyright © 2021 eabalboni.com! All rights reserved p.IVA 02768260362 | E.mail info@andreabalboni.com | Disclaimer | Privacy