Malware Definitionsalso known as PDF/BlueNoroff, Trojan.OSX.Nukesped, Trojan.PDF.Agent
-
-
- Last updated:
- 07/07/23 10:25 pm
-
Description
Rustbucket is a trojan horse that is disguised as a PDF reader app but will download various payloads to the target’s system such as run arbitrary commands to gather system details and encompassing information, as well as perform various actions.
Rustbucket Threat Removal
MacScan can detect and remove Rustbucket Trojan Horse from your system, as well as provide protection against other security and privacy threats. A 30-day trial is available to scan your system for this threat.
Download MacScan
July 11, 2023 •
1 min read
Malware Definitionsalso known as Trojan.OSX.SamScissors
-
-
- Last updated:
- 06/29/23 3:08 pm
-
Description
The 3CX VOIP desktop application contains a trojan which is attributed to the Lazarus Group (North Korea) and has been notarized by Apple.
3CXDesktopApp Threat Removal
MacScan can detect and remove 3CXDesktopApp Trojan Horse from your system, as well as provide protection against other security and privacy threats. A 30-day trial is available to scan your system for this threat.
Download MacScan
July 11, 2023 •
1 min read
Malware Definitionsalso known as Not-a-virus:HEUR:RiskTool.OSX.Miner.aa
-
-
- Last updated:
- 02/13/23 8:21 pm
-
Description
Miner is a trojan horse that contains cryptomining malware designed to crypto-jack the user’s local resources.
Miner Threat Removal
MacScan can detect and remove Miner Trojan Horse from your system, as well as provide protection against other security and privacy threats. A 30-day trial is available to scan your system for this threat.
Download MacScan
July 11, 2023 •
1 min read
Malware Definitionsalso known as HEUR:Backdoor.OSX.Cobalt.b, Trojan-Downloader.Python.Agent.am
-
-
- Last updated:
- 06/29/23 3:24 pm
-
Description
Cobalt Strike a trojan that gives attackers access to your computer and run multiple tasks such as downloading or encrypting your files. a trojan horse.
Cobalt Strike Threat Removal
MacScan can detect and remove Cobalt Strike Trojan Horse from your system, as well as provide protection against other security and privacy threats. A 30-day trial is available to scan your system for this threat.
Download MacScan
July 11, 2023 •
1 min read
Malware Definitionsalso known as Backdoor.Python.JokerSpy.a
-
-
- Last updated:
- 07/07/23 10:23 pm
-
Description
JokerSpy is a trojanized backdoor that can be used to install additional components and allow access for malicious purposes.
JokerSpy Threat Removal
MacScan can detect and remove JokerSpy Trojan Horse from your system, as well as provide protection against other security and privacy threats. A 30-day trial is available to scan your system for this threat.
Download MacScan
July 11, 2023 •
1 min read
Malware Definitionsalso known as Hoax.OSX.Defma.gen
-
-
- Last updated:
- 02/13/23 8:05 pm
-
Description
Defma is a trojan horse that poses as an antivirus package named Mac Security, but is only detrimental to users.
Defma Threat Removal
MacScan can detect and remove Defma Trojan Horse from your system, as well as provide protection against other security and privacy threats. A 30-day trial is available to scan your system for this threat.
Download MacScan
July 11, 2023 •
1 min read
Malware Definitionsalso known as Trojan-PSW.OSX.HashBreaker
-
-
- Last updated:
- 04/11/23 12:20 am
-
Description
MacStealer is a trojan that steals passwords from the Apple iCloud Keychain
MacStealer Threat Removal
MacScan can detect and remove MacStealer Trojan Horse from your system, as well as provide protection against other security and privacy threats. A 30-day trial is available to scan your system for this threat.
Download MacScan
July 11, 2023 •
1 min read
Malware Definitionsalso known as HEUR:Trojan-Downloader.OSX.Agent.gen
-
-
- Last updated:
- 03/23/23 12:42 am
-
Description
iWebUpdate is a trojan downloader that can further download arbitrary binaries and execute them from a remote server.
iWebUpdate Threat Removal
MacScan can detect and remove iWebUpdate Trojan Horse from your system, as well as provide protection against other security and privacy threats. A 30-day trial is available to scan your system for this threat.
Download MacScan
July 11, 2023 •
1 min read
Malware Definitionsalso known as Trojan-Downloader.OSX.AScript.a
-
-
- Last updated:
- 06/29/23 3:21 pm
-
Description
Nukesped Ascript is a backdoor trojan that targets Korean macOS computers for remote access and control.
Nukesped Ascript Threat Removal
MacScan can detect and remove Nukesped Ascript Trojan Horse from your system, as well as provide protection against other security and privacy threats. A 30-day trial is available to scan your system for this threat.
Download MacScan
July 11, 2023 •
1 min read
Malware Definitionsalso known as OSX/Morcut
Type:
Trojan Horse
Platform:
Mac OS X
Last updated:
02/09/16 9:14 pm
Threat Level:
High
Description
Crisis is a Trojan horse that creates a backdoor on infected systems. Also known as Morcut, Crisis was first discovered in 2012, with subsequent variants appearing in the years to follow.
Crisis comes in the form of an illegitimate Adobe Flash Player installer. If installed, Crisis takes steps to achieve persistence (the ability to survive reboots), and then performs several actions, the nature of which depends on whether or not the Trojan was launched with administrative permissions. On a system which …
March 6, 2021 •
2 min read
Malware Definitionsalso known as OSX/StealBit
-
-
- Last updated:
- 01/18/23 6:40 pm
-
Description
CoinThief is a trojan horse that steals Bitcoins.
CoinThief Threat Removal
MacScan can detect and remove CoinThief Trojan Horse from your system, as well as provide protection against other security and privacy threats. A 30-day trial is available to scan your system for this threat.
Download MacScan
March 6, 2021 •
1 min read
Malware DefinitionsType:
Trojan Horse
Platform:
Mac OS X
Last updated:
04/02/16 10:02 am
Threat Level:
High
Description
CallMe is a Trojan horse that targets Tibetan activist organizations. The Trojan infects its target through a malicious Microsoft Word (.doc) file, exploiting an older Word vulnerability cataloged as CVE-2009-0563.
Once active, CallMe is able to run commands on the infected system; however, it only takes a limited number of actions using these permissions. The Trojan attempts to connect to a command and control server; creates a copy of the user’s contact list for the malware authors to access remotely; and establishes a …
March 6, 2021 •
2 min read