Threat Encyclopedia

Browse the Fortiguard Labs extensive encyclopedia of threats. Click any title to view more details of the threat. Can't find what you are looking for? Try using the search bar above to find a specific threat description.


Aug 24, 2004
Specifics This virus listens for communication from a W32/Sasser infected system and then directly targets that system. The virus...

Aug 24, 2004
Specifics This is a 64-bit virus, coded for 64-bit Windows running on top of AMD64 processors. Files not protected by System...

Aug 24, 2004
Specifics This 32-bit Internet worm contains code to perform several functions, and to compromise systems using several methods. This...

Aug 23, 2004
Specifics This threat combines vulnerabilities and exploits in order to run its code. It has been speculated that several websites...

Aug 20, 2004

Aug 19, 2004
'T-Virus' is a reference to a gimic, or marketing ploy, to promote the game 'Resident Evil'. The website responsible for sending...

Aug 18, 2004
Specifics This Trojan steals logon information and sends it to a pre-configured email address. This Trojan loads at Windows startup...

Aug 18, 2004
Specifics This Trojan binds with TCP ports 40008 and 40010, and awaits instructions from a malicious user. If run, the Trojan...

Aug 17, 2004
Specifics This proof-of-concept dialer Trojan is coded for Nokia...

Aug 11, 2004
Specifics This is a remote access Trojan which can receive instructions...

Aug 10, 2004
Specifics This 32-bit virus pretends to be an installable file...

Aug 07, 2004

Aug 05, 2004
Specifics This Trojan is a proof-of-concept for Windows CE handheld...

Aug 05, 2004
Specifics This Trojan is a package installer for a remote shell...

Aug 04, 2004
Specifics This Trojan creates new shares onto a compromised system....

Aug 04, 2004

Aug 03, 2004

Aug 03, 2004