The goal of this project is to make virtual world a safer and better place without child pornography, major computer crime and RIAA.
Login As
You can log in if you are registered at one of these services:
Security Bulletins
Latest Malware Updates

Infostealer.Posteal

02/26/2015

Downloader.Busadom

02/26/2015

Trojan.Ladocosm

02/26/2015

SONAR.SuspDocRun

02/25/2015

SONAR.SuspHelpRun

02/25/2015
02/19/2015

JS.Bondat

Type:  Worm, Trojan
Discovered:  19.02.2015
Updated:  19.02.2015
Affected systems:  Windows 2000, Windows 7, Windows 95, Windows 98, Windows Me, Windows NT, Windows Server 2003, Windows Server 2008, Windows Vista, Windows XP
AV Vendor:  Symantec

Description:

pache X-Powered-By: Servlet/2.5 JSP/2.1 X-Frame-Options: SAMEORIGIN Content-Type: text/html; charset=UTF-8 Date: Thu, 19 Feb 2015 20:01:04 GMT Content-Length: 8554 Connection: keep-alive JS.Bondat | Symantec s.pageName=metaData['page_name']; Symantec | United States Close Close

Naked Security

http://www.naked-security.com/security_response/index.jsp

JS.Bondat

Risk Level 1: Very Low

Discovered: February 18, 2015 Updated: February 19, 2015 1:08:03 PM Type: Trojan, Worm Infection Length: 14,402 bytes Systems Affected: Windows 2000, Windows 7, Windows 95, Windows 98, Windows Me, Windows NT, Windows Server 2003, Windows Server 2008, Windows Vista, Windows XP

SUMMARY

JS.Bondat JS.Bondat is a JavaScript worm that spreads through removable drives.

Naked Security is currently investigating this threat and will post more information as it becomes available.


Antivirus Protection Dates

  • Initial Rapid Release version pending
  • Latest Rapid Release version pending
  • Initial Daily Certified version pending
  • Latest Daily Certified version pending
  • Initial Weekly Certified release date February 25, 2015
Click here for a more detailed description of Rapid Release and Daily Certified virus definitions.

Threat Assessment

Wild
  • Wild Level: Low
  • Number of Infections: 0 - 49
  • Number of Sites: 0 - 2
  • Geographical Distribution: Low
  • Threat Containment: Easy
  • Removal: Easy
Damage
  • Damage Level: Medium
  • Modifies Files: Replaces files.
  • Releases Confidential Info: Steals information.
Distribution
  • Distribution Level: Low
  • Target of Infection: Removable drives.

Security Advisories Database

Remote Code Execution Vulnerability in Microsoft OpenType Font Driver

A remote attacker can execute arbitrary code on the target system.

07/21/2015

SQL Injection Vulnerability in Piwigo

SQL inection vulnerability has been discovered in Piwigo.

02/05/2015

Cross-site Scripting Vulnerability in DotNetNuke

A cross-site scripting (XSS) vulnerability has been discovered in DotNetNuke.

02/05/2015

Cross-site Scripting Vulnerability in Hitachi Command Suite

A cross-site scripting vulnerability was found in Hitachi Command Suite.

02/02/2015

Denial of service vulnerability in FreeBSD SCTP RE_CONFIG Chunk Handling

An attacker can perform a denial of service attack.

01/30/2015

Denial of service vulnerability in Apache Traffic Server HTTP TRACE Max-Forwards

An attacker can perform a denial of service attack.

01/30/2015

Denial of service vulnerability in MalwareBytes Anti-Exploit "mbae.sys"

An attacker can perform a denial of service attack.

01/30/2015

Denial of service vulnerability in Linux Kernel splice

An attacker can perform a denial of service attack.

01/29/2015

Denial of service vulnerability in Python Pillow Module PNG Text Chunks Decompression

An attacker can perform a denial of service attack.

01/20/2015