Description
Malicious programs of this type are designed to harvest email addresses from a computer and then send them to the malicious user via email, the web, FTP, or other methods.
Stolen addresses are then used by cyber criminals to conduct mass mailings of malware and spam.
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!