About: LOLPic   Sponge Permalink

An Entity of Type : owl:Thing, within Data Space : 134.155.108.49:8890 associated with source dataset(s)

A skype based worm named LOLPic was discovered in early October 2012 in which a message was sent to all users on the infected host's contacts list. The message will use the text of lol is this your new profile pic?[URL]), and requested users to check if it was the image. Most users who recieved this message fell for the trick and recieved malware. This malware works by opening a backdoor to add it to a bot network used to DDoS a website of the hackers choice, it is classed as ransomeware as it holds the user to ransom.

AttributesValues
rdfs:label
  • LOLPic
rdfs:comment
  • A skype based worm named LOLPic was discovered in early October 2012 in which a message was sent to all users on the infected host's contacts list. The message will use the text of lol is this your new profile pic?[URL]), and requested users to check if it was the image. Most users who recieved this message fell for the trick and recieved malware. This malware works by opening a backdoor to add it to a bot network used to DDoS a website of the hackers choice, it is classed as ransomeware as it holds the user to ransom.
  • A skype based worm named LOLPic was discovered in early October 2012 in which a message was sent to all users on the infected host's contacts list. The message will use the text of lol is this your new profile pic?[URL]), and requested users to check if it was the image. Most users who recieved this message fell for the trick and recieved malware. This malware works by opening a backdoor to add it to a bot network used to DDoS a website of the hackers choice, it is classed as ransomeware as it holds the user to ransom. ==Aliases==*Lolpic.A
dcterms:subject
dbkwik:malware/pro...iPageUsesTemplate
dbkwik:virus/prope...iPageUsesTemplate
abstract
  • A skype based worm named LOLPic was discovered in early October 2012 in which a message was sent to all users on the infected host's contacts list. The message will use the text of lol is this your new profile pic?[URL]), and requested users to check if it was the image. Most users who recieved this message fell for the trick and recieved malware. This malware works by opening a backdoor to add it to a bot network used to DDoS a website of the hackers choice, it is classed as ransomeware as it holds the user to ransom. ==Backdoor:Win32/Agent.ACRX==This is the backdoor that the hacker uses to add it to a bot network. ==LOLPic.in==The dropper,known as LOLPic.in is a component of the worm and it installs malware.==Variants==*LOLPic.b-This variant uses Yahoo Messenger instead of Skype.*LOLPic.qw-This variant said to download Skype Security(Rogue AV).*LOLPic.bxzs-This variant deleted hal.dll. ==Aliases==*Lolpic.A .7528353-83/worm-spreading-on-skype-im-installs-ransomware/
  • A skype based worm named LOLPic was discovered in early October 2012 in which a message was sent to all users on the infected host's contacts list. The message will use the text of lol is this your new profile pic?[URL]), and requested users to check if it was the image. Most users who recieved this message fell for the trick and recieved malware. This malware works by opening a backdoor to add it to a bot network used to DDoS a website of the hackers choice, it is classed as ransomeware as it holds the user to ransom.
Alternative Linked Data Views: ODE     Raw Data in: CXML | CSV | RDF ( N-Triples N3/Turtle JSON XML ) | OData ( Atom JSON ) | Microdata ( JSON HTML) | JSON-LD    About   
This material is Open Knowledge   W3C Semantic Web Technology [RDF Data] Valid XHTML + RDFa
OpenLink Virtuoso version 07.20.3217, on Linux (x86_64-pc-linux-gnu), Standard Edition
Data on this page belongs to its respective rights holders.
Virtuoso Faceted Browser Copyright © 2009-2012 OpenLink Software