The goal of this project is to make virtual world a safer and better place without child pornography, major computer crime and RIAA.
Login As
You can log in if you are registered at one of these services:
Security Bulletins
Latest Malware Updates

Infostealer.Posteal

02/26/2015

Downloader.Busadom

02/26/2015

Trojan.Ladocosm

02/26/2015

SONAR.SuspDocRun

02/25/2015

SONAR.SuspHelpRun

02/25/2015
01/30/2015

Trojan.Arsivir

Type:  Trojan
Discovered:  30.01.2015
Updated:  30.01.2015
Affected systems:  Windows 2000, Windows 7, Windows 95, Windows 98, Windows Me, Windows NT, Windows Server 2003, Windows Server 2008, Windows Vista, Windows XP
AV Vendor:  Symantec

Description:

When the Trojan is executed, it creates the following files:
  • %SystemDrive%\Documents and Settings\All Users\Application Data\Chromium.exe
  • %SystemDrive%\Documents and Settings\All Users\Application Data\a_chrome.exe
  • %SystemDrive%\Documents and Settings\All Users\Application Data\free.exe
  • %UserProfile%\Local Settings\Application Data\Google\Chrome\User Data\Default\Extensions\[EXTENSION ID]\bg.txt
  • %UserProfile%\AppData\Local\Google\Chrome\User Data\Default\Extensions\[EXTENSION ID]\bg.txt

Next, the Trojan creates the following registry entry:
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\"Google Chromium" = "%SystemDrive%\Documents and Settings\All Users\Application Data\Chromium.exe"

The Trojan then attempts to overwrite the following files with %SystemDrive%\Documents and Settings\All Users\Application Data\Chromium.exe:
  • %UserProfile%\Local Settings\Application Data\Yandex\YandexBrowser\Application\browser.exe
  • %UserProfile%AppData\Local\Yandex\YandexBrowser\Application\browser.exe
  • %ProgramFiles%\Mozilla Firefox\firefox.exe
  • %ProgramFiles%\Opera\launcher.exe

Next, the Trojan modifies the following registry entries:
  • HKEY_LOCAL_MACHINE, Software\Microsoft\Windows\CurrentVersion\Policies\System\"EnableLUA" = "0"
  • HKEY_LOCAL_MACHINE, Software\Policies\Google\Update\"UpdateDefault" = "0"

The Trojan then adds the following URLs to %System%\drivers\etc\hosts:
  • 127.0.0.1 tools.google.com
  • 127.0.0.1 clients4.google.com

The Trojan then connects to the following remote locations:
  • www.filmver.com
  • www.neran.net
  • www.pornokan.com

The Trojan may then download executables, updates, and Chrome extensions.

Security Advisories Database

Remote Code Execution Vulnerability in Microsoft OpenType Font Driver

A remote attacker can execute arbitrary code on the target system.

07/21/2015

SQL Injection Vulnerability in Piwigo

SQL inection vulnerability has been discovered in Piwigo.

02/05/2015

Cross-site Scripting Vulnerability in DotNetNuke

A cross-site scripting (XSS) vulnerability has been discovered in DotNetNuke.

02/05/2015

Cross-site Scripting Vulnerability in Hitachi Command Suite

A cross-site scripting vulnerability was found in Hitachi Command Suite.

02/02/2015

Denial of service vulnerability in FreeBSD SCTP RE_CONFIG Chunk Handling

An attacker can perform a denial of service attack.

01/30/2015

Denial of service vulnerability in Apache Traffic Server HTTP TRACE Max-Forwards

An attacker can perform a denial of service attack.

01/30/2015

Denial of service vulnerability in MalwareBytes Anti-Exploit "mbae.sys"

An attacker can perform a denial of service attack.

01/30/2015

Denial of service vulnerability in Linux Kernel splice

An attacker can perform a denial of service attack.

01/29/2015

Denial of service vulnerability in Python Pillow Module PNG Text Chunks Decompression

An attacker can perform a denial of service attack.

01/20/2015