Search by property

Jump to navigation Jump to search

This page provides a simple browsing interface for finding entities described by a property and a named value. Other available search interfaces include the page property search, and the ask query builder.

Search by property

A list of all pages that have property "Description" with value "File download and install / execute". Since there have been only a few results, also nearby values are displayed.

Showing below up to 26 results starting with #1.

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)


    

List of results

  • Fast flux  + (Fast flux is a DNS technique used by botnets to hide phishing and malware delivery sites behind an ever-changing network of compromised hosts acting as proxies.)
  • GRE flood  + (Generic routing encapsulation)
  • SPDY grabbing  + (Grabbing of SPDY session content.)
  • IoT  + (Internet of Things assets (cameras, home appliances, ...))
  • Spying  + (Involves RATs and Rootkits)
  • Logging  + (Logging information is sent to the C&C)
  • Mailslot  + (Mailslots are an IPC mechanism allowing multiple clients to send messages to a server.)
  • Memory scrapping  + (Memory scrapping (for passwords, credit card data,...))
  • Update  + (Mise à jour du malware grâce au botnet)
  • Startpage modification  + (Modification of the browser's start page)
  • Camera capture  + (Monitor camera activity)
  • Microphone capture  + (Monitor microphone (sound) activity)
  • Premium services  + (Other premium rate services (such as pay per view videos, games...).)
  • Hosts modification  + (Part of the Pharming process)
  • Point-of-sale  + (Point-of-sale botnets: target credit card and other personal data on POS terminals.)
  • MIRC  + (Popular IRC software, sometimes used as basis for IRC malware construction.)
  • Shared drive vector  + (Propagates through shared drive / network share)
  • Bitcoin payment  + (Proposes a Bitcoin payment as a method to collect a ransom (or fake fine).)
  • RAT  + (Remote administration trojans)
  • SOCKS  + (SOCKS proxy)
  • Pop-up  + (Show a pop-up message on the victims' computers)
  • Store data in ADS  + (Store data in NTFS Alternate data streams)
  • COVID-19 pandemic  + (The 2019/2020 COVID-19 coronavirus pandemic resulted in a number of related or co-occurring attacks and malware operations)
  • Server-side polymorphism  + (The code that operates the mutation is on a dedicated server.)
  • Cross-infection  + (The malware is able to infect executables for different platforms: 64 and 32 bit, MacOS, Windows, Linux, Android...)
  • POP3 password theft  + (Theft of POP3 logins and passwords)