Search by property

Jump to navigation Jump to search

This page provides a simple browsing interface for finding entities described by a property and a named value. Other available search interfaces include the page property search, and the ask query builder.

Search by property

A list of all pages that have property "Description" with value "Show a pop-up message on the victims' computers". Since there have been only a few results, also nearby values are displayed.

Showing below up to 12 results starting with #1.

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)


    

List of results

  • Premium services  + (Other premium rate services (such as pay per view videos, games...).)
  • Hosts modification  + (Part of the Pharming process)
  • Point-of-sale  + (Point-of-sale botnets: target credit card and other personal data on POS terminals.)
  • MIRC  + (Popular IRC software, sometimes used as basis for IRC malware construction.)
  • Shared drive vector  + (Propagates through shared drive / network share)
  • Bitcoin payment  + (Proposes a Bitcoin payment as a method to collect a ransom (or fake fine).)
  • RAT  + (Remote administration trojans)
  • SOCKS  + (SOCKS proxy)
  • Pop-up  + (Show a pop-up message on the victims' computers)
  • Store data in ADS  + (Store data in NTFS Alternate data streams)
  • COVID-19 pandemic  + (The 2019/2020 COVID-19 coronavirus pandemic resulted in a number of related or co-occurring attacks and malware operations)
  • Server-side polymorphism  + (The code that operates the mutation is on a dedicated server.)
  • Cross-infection  + (The malware is able to infect executables for different platforms: 64 and 32 bit, MacOS, Windows, Linux, Android...)
  • POP3 password theft  + (Theft of POP3 logins and passwords)
  • Downloading  + (These botnets are also called "loaders" and are used for pay-per-install operations.)
  • Polymorphism  + (Uses a polymorphic engine to mutate while keeping the original algorithm intact)
  • Dynamic DNS  + (Using dynamic DNS providers such as dyndns(dot)com)
  • Handle generation algorithm  + (Using the same principle as DGA, but this time it is the ID of the resource to access that is automatically generated, such as a twitter handle)
  • WoW password theft  + (World of Warcraft password theft)
  • XOR encoding  + (XOR encoding of data for storage and/or exfiltration)