The goal of this project is to make virtual world a safer and better place without child pornography, major computer crime and RIAA.
Login As
You can log in if you are registered at one of these services:
Security Bulletins
Latest Malware Updates

Infostealer.Posteal

02/26/2015

Downloader.Busadom

02/26/2015

Trojan.Ladocosm

02/26/2015

SONAR.SuspDocRun

02/25/2015

SONAR.SuspHelpRun

02/25/2015
02/09/2012

Backdoor.Breut

Type:  Trojan
Discovered:  09.02.2012
Updated:  10.02.2012
Affected systems:  Windows 98, Windows 95, Windows XP, Windows Me, Windows Vista, Windows NT, Windows Server 2003, Windows 2000
AV Vendor:  Symantec

Description:

The Trojan may arrive on the compromised computer as a self-extracting .rar file.

When the Trojan is executed, it creates the following files:
  • %Temp%\GoogleUp-date.wxe
  • %Temp%\_$temp

Next, it creates the following mutex so that only one instance of the threat executes on the computer:
DC_MUTEX-BU4N34A

The Trojan then creates the following file to record key strokes:
%Temp%\dclogs\[CURRENT DAY]-[RANDOM NUMBER].dc

Next, the Trojan connects to the following location in order to open a back door on the compromised computer:
216.6.0.28

The Trojan then allows a remote attacker to perform the following actions on the compromised computer:
  • Capture webcam activity
  • Disable the notification setting for certain antivirus programs
  • Download and execute arbitrary programs and commands
  • Modify the hosts file
  • Record key strokes
  • Retrieve system information about the computer
  • Start or end processes
  • Steal passwords
  • Update itself

Security Advisories Database

Remote Code Execution Vulnerability in Microsoft OpenType Font Driver

A remote attacker can execute arbitrary code on the target system.

07/21/2015

SQL Injection Vulnerability in Piwigo

SQL inection vulnerability has been discovered in Piwigo.

02/05/2015

Cross-site Scripting Vulnerability in DotNetNuke

A cross-site scripting (XSS) vulnerability has been discovered in DotNetNuke.

02/05/2015

Cross-site Scripting Vulnerability in Hitachi Command Suite

A cross-site scripting vulnerability was found in Hitachi Command Suite.

02/02/2015

Denial of service vulnerability in FreeBSD SCTP RE_CONFIG Chunk Handling

An attacker can perform a denial of service attack.

01/30/2015

Denial of service vulnerability in Apache Traffic Server HTTP TRACE Max-Forwards

An attacker can perform a denial of service attack.

01/30/2015

Denial of service vulnerability in MalwareBytes Anti-Exploit "mbae.sys"

An attacker can perform a denial of service attack.

01/30/2015

Denial of service vulnerability in Linux Kernel splice

An attacker can perform a denial of service attack.

01/29/2015

Denial of service vulnerability in Python Pillow Module PNG Text Chunks Decompression

An attacker can perform a denial of service attack.

01/20/2015