Nuclear Exploit Leads to Cidox Malware IThe Trojan has virtual machine detection capabilities. It searches for and disables security products from the following vendors: AVG Avira Bit Defender Avast DrWeb Kaspersky Microsoft Security Essentials ESET Symantec McAfee TrendMicro The Trojan can inject code in the following browsers: Internet Explorer Firefox Opera Chrome Safari The Trojan may then redirect the above browsers to any of the following remote locations: Next, the Trojan gathers the following information from the compromised computer and sends it to one of the above remote locations: Operating system version Virtual machine details, if […]