Skip to main content

Questions tagged [trojan]

In computing, Trojan horse, or Trojan, is any malicious computer program which is used to hack into a computer by misleading users of its true intent.

0 votes
1 answer
70 views

How to handle trojan executed on my laptop? [duplicate]

Unfortunately, I have executed an .exe file on my PC. After scanning the file I understood that it is a trojan and after checking its behaviour using VirusTotal I understood that it left many files on ...
VSB's user avatar
  • 185
1 vote
0 answers
81 views

Why do I suddenly receive print notifications on Windows 10? [closed]

I have seen whats's in the image. But i don't have any printer. OS: Windows 10 22H2
priv-like-user's user avatar
0 votes
2 answers
147 views

Why spamassasin is doing dns lookup?

I have a server which have configured Amavis and Spamassasin (in default state only). I recently noticed log lines that probably indicate DNS query failure, below is an excerpt: Nov 21 11:15:40 ...
SUNITA GUPTA's user avatar
1 vote
1 answer
109 views

Can Firejails protect against malicious links?

I would like to ask, if Firejails on Linux, protects when clicking a malicious link in the browser e.g. from downloading a keylogger or a trojan.
Dion's user avatar
  • 121
0 votes
1 answer
524 views

Why does the windows firewall allow apps to communicate through so many different ports and to so many different addresses?

I looked at my default windows defender firewall on Windows 10 22H2, and most of the rules allow apps to communicate through any local port to any remote address and port. I have read other questions ...
Cybsechuman's user avatar
1 vote
0 answers
27 views

Removing oneetx.exe [duplicate]

So, I accidentally executed an installer downloaded from the web, Avast didn't recognize it as a virus. Nonetheless, by seeing properties I saw it was a network monitoring app, it added a process in ...
gabriel's user avatar
  • 11
0 votes
1 answer
290 views

Do viruses survive in other drive and than re infect after resetting the PC?

Backstory: I got infected while installing some shady software and at that time I kept Windows Defender off, (I have very much faith on my shady website) by turning its features off. But when I ...
newperson's user avatar
4 votes
2 answers
632 views

How to find the process that is running PowerShell commands that appear in Windows Defender

On one of our Windows Datacenter 2016, there's an alert that a trojan is trying to install : The following PowerShell commands are trying to execute at seemingly random hours of the day (always ...
Maxime's user avatar
  • 139
50 votes
3 answers
14k views

Malicious code somehow hidden with whitespace?

I recently came across a php file on a compromised website that had what appeared (in Sublime Text) to be a huge white-space gap. When I run a diff against the original source file I can clearly see ...
Eaten by a Grue's user avatar
1 vote
2 answers
1k views

How payloads provide backdoors when the victims are out of local network [duplicate]

I am a newbie in cyber security and trying to learn how payloads provide backdoors when the victims are out of the local network. I know that metasploit is a good tool for making payloads, and using ...
Not a Salmon Fish's user avatar
2 votes
2 answers
2k views

Is there malware that can run without user interaction after a download from the internet?

Is there malware that can run from a simple download from the internet autonomously without user interaction/initiation? I know there are worms that can do that, but I assumed they needed to be opened ...
Rhodium0092's user avatar
0 votes
0 answers
176 views

What is the steps to be taken when you suspect a linux malware has infected your computer?

Using Linux is a different beast entirely but sometimes malware can blend as seemingly harmless system binaries like this post Bpfdoor Like this post which documents a highly evasive Linux malware. ...
geek's user avatar
  • 119
0 votes
1 answer
189 views

Clamscan: Infected files found in Pinta

I'm currently performing a full system scan with clamscan and found the following message: /usr/lib/pinta/Clipper.dll: Win.Trojan.Clipper-9942182-0 FOUND I went online and couldn't find any reference ...
import numpy as np's user avatar
1 vote
0 answers
25 views

Email supposedly from the future mentioning fairly recent password [duplicate]

Just got an email that mentioned, in very broken english, having hacked my email etc. and actually managed to list my current password of that email account. The mail was, apparently, send by that ...
ZarrTax's user avatar
  • 11
2 votes
0 answers
146 views

Opened compromised Excel file - am I safe?

Long story short, got duped into opening an XLSM in Excel, with macros being enabled. Realised instantly. Digged into the Excel structure, found the following (extremely obfuscated) payload: =CALL(&...
user275197's user avatar

15 30 50 per page
1
2 3 4 5
10