Parent class: TrojWare
Trojans are malicious programs that perform actions which are not authorized by the user: they delete, block, modify or copy data, and they disrupt the performance of computers or computer networks. Unlike viruses and worms, the threats that fall into this category are unable to make copies of themselves or self-replicate. Trojans are classified according to the type of action they perform on an infected computer.Class: Rootkit
This type of malicious program is designed to conceal certain objects or activities in the system. Registry keys (those used to automatically launch malicious objects, for example), files, folders, and processes in the memory of an infected computer, as well as malicious network activity, can all be hidden. Rootkits themselves have any malicious payload but in most cases, this type of program is used to prevent malicious programs from being detected and extend the length of time that they run on an infected computer.Read more
Platform: Win32
Win32 is an API on Windows NT-based operating systems (Windows XP, Windows 7, etc.) that supports execution of 32-bit applications. One of the most widespread programming platforms in the world.Description
This family consists of malicious objects that use malicious software modules from Shadow Brokers’ leaks or are created on the basis of these modules. These objects are loaded into system memory and conceal the presence of other malware.Top 10 countries with most attacked users (% of total attacks)
1
Vietnam
40.45%
2
Russian Federation
18.13%
3
India
7.54%
4
Indonesia
3.96%
5
Brazil
2.74%
6
China
2.56%
7
Bangladesh
2.06%
8
Thailand
1.80%
9
Iran, Iislamic Republic of
1.76%
10
Ukraine
1.34%
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!