The goal of this project is to make virtual world a safer and better place without child pornography, major computer crime and RIAA.
Login As
You can log in if you are registered at one of these services:
Security Bulletins
Latest Malware Updates

Infostealer.Posteal

02/26/2015

Downloader.Busadom

02/26/2015

Trojan.Ladocosm

02/26/2015

SONAR.SuspDocRun

02/25/2015

SONAR.SuspHelpRun

02/25/2015
02/17/2015

W32.Wervik

Type:  Worm
Discovered:  17.02.2015
Updated:  17.02.2015
Affected systems:  Windows 2000, Windows 7, Windows 95, Windows 98, Windows Me, Windows NT, Windows Server 2003, Windows Server 2008, Windows Vista, Windows XP
AV Vendor:  Symantec

Description:

When the worm is executed, it copies itself to the following locations:
  • %DriveLetter%\My Pictures\svchost.exe
  • %DriveLetter%\My Documents\svchost.exe
  • %DriveLetter%\Games\svchost.exe
  • %AllUsersProfile%\Start Menu\Programs\Startup\svchost.exe
  • %AllUsersProfile%\Application Data\svchost.exe
  • %DriveLetter%\[ORIGINAL FILE NAME]
  • %Temp%\readme.exe

The worm then searches for .rar files and inserts itself as the following file to the RAR container:
  • readme.exe

Next, the worm creates the following files:
  • %Temp%\time.txt
  • %AllUsersProfile%\Application Data\svchost.exe.ini

The worm then creates the following registry entries so that it runs every time Windows starts:
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\"svchost.exe" = "[PATH TO MALWARE]"
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\"svchost.exe" = "[PATH TO MALWARE]"

Next, the worm connects to the following remote location:
  • hasto.zapto.org

The worm then opens a back door on the compromised computer, allowing an attacker to perform the following actions:
  • Collect information about the computer
  • Collect antivirus and firewall product information
  • Download files
  • Execute files
  • Uninstall itself
  • Restart the computer
  • Perform denial of service attacks
  • Display a message box
  • Send Facebook messages
  • Send Skype messages
  • Display advertisements

The worm spreads through removable and network drives by copying itself to the following locations:
  • %DriveLetter%\system.ini
  • %DriveLetter%\autoexec.bat
  • %DriveLetter%\system.bin

Security Advisories Database

Remote Code Execution Vulnerability in Microsoft OpenType Font Driver

A remote attacker can execute arbitrary code on the target system.

07/21/2015

SQL Injection Vulnerability in Piwigo

SQL inection vulnerability has been discovered in Piwigo.

02/05/2015

Cross-site Scripting Vulnerability in DotNetNuke

A cross-site scripting (XSS) vulnerability has been discovered in DotNetNuke.

02/05/2015

Cross-site Scripting Vulnerability in Hitachi Command Suite

A cross-site scripting vulnerability was found in Hitachi Command Suite.

02/02/2015

Denial of service vulnerability in FreeBSD SCTP RE_CONFIG Chunk Handling

An attacker can perform a denial of service attack.

01/30/2015

Denial of service vulnerability in Apache Traffic Server HTTP TRACE Max-Forwards

An attacker can perform a denial of service attack.

01/30/2015

Denial of service vulnerability in MalwareBytes Anti-Exploit "mbae.sys"

An attacker can perform a denial of service attack.

01/30/2015

Denial of service vulnerability in Linux Kernel splice

An attacker can perform a denial of service attack.

01/29/2015

Denial of service vulnerability in Python Pillow Module PNG Text Chunks Decompression

An attacker can perform a denial of service attack.

01/20/2015