The goal of this project is to make virtual world a safer and better place without child pornography, major computer crime and RIAA.
Login As
You can log in if you are registered at one of these services:
Security Bulletins
Latest Malware Updates

Infostealer.Posteal

02/26/2015

Downloader.Busadom

02/26/2015

Trojan.Ladocosm

02/26/2015

SONAR.SuspDocRun

02/25/2015

SONAR.SuspHelpRun

02/25/2015
02/17/2015

Infostealer.Kegotip

Type:  Trojan
Discovered:  17.02.2015
Updated:  17.02.2015
Affected systems:  Windows 2000, Windows 7, Windows 95, Windows 98, Windows Me, Windows NT, Windows Server 2003, Windows Server 2008, Windows Vista, Windows XP
AV Vendor:  Symantec

Description:

The Trojan may be downloaded and installed on the compromised computer by the following malware:

Once executed, the Trojan creates the following files:
  • %Temp%\MSWQ[RANDOM CHARACTER FILE NAME].tmp
  • %UserProfile%\dotrudtegibd.exe

The Trojan then creates the following registry entries:
  • HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\"C:\WINDOWS\system32\"svchost.exe" = "%System%\svchost.exe:*:Enabled:Microsoft Office"
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\"VendorId" = "[HEXADECIMAL VALUE]"
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\"dotrudtegibd" = "%UserProfile%\dotrudtegibd.exe"

It also creates the following registry subkey:
  • HKEY_CURRENT_USER\Software\Stqbckeeiwwaw

The Trojan steals user credentials from the following software programs:
  • SecureFX
  • FTP Rush
  • UltraFXP
  • ALFTP
  • FTP Commander
  • FTP Navigator
  • TurboFTP
  • SmartFTP
  • WS_FTP
  • FileZilla
  • Far Manager
  • Total Commander
  • GlobalSCAPE Software

The Trojan may also gather email addresses from files on the compromised computer, excluding those with the following extensions:
  • .rar
  • .zip
  • .cab
  • .avi
  • .mp3
  • .jpg
  • .gif

It then sends the stolen information to the following remote location:
  • 64.79.90.82

Security Advisories Database

Remote Code Execution Vulnerability in Microsoft OpenType Font Driver

A remote attacker can execute arbitrary code on the target system.

07/21/2015

SQL Injection Vulnerability in Piwigo

SQL inection vulnerability has been discovered in Piwigo.

02/05/2015

Cross-site Scripting Vulnerability in DotNetNuke

A cross-site scripting (XSS) vulnerability has been discovered in DotNetNuke.

02/05/2015

Cross-site Scripting Vulnerability in Hitachi Command Suite

A cross-site scripting vulnerability was found in Hitachi Command Suite.

02/02/2015

Denial of service vulnerability in FreeBSD SCTP RE_CONFIG Chunk Handling

An attacker can perform a denial of service attack.

01/30/2015

Denial of service vulnerability in Apache Traffic Server HTTP TRACE Max-Forwards

An attacker can perform a denial of service attack.

01/30/2015

Denial of service vulnerability in MalwareBytes Anti-Exploit "mbae.sys"

An attacker can perform a denial of service attack.

01/30/2015

Denial of service vulnerability in Linux Kernel splice

An attacker can perform a denial of service attack.

01/29/2015

Denial of service vulnerability in Python Pillow Module PNG Text Chunks Decompression

An attacker can perform a denial of service attack.

01/20/2015