Keyword: link
300 Total Search   |   Showing Results : 241 - 260
This worm may be downloaded from remote sites by other malware.
This PHP script Trojan uses social engineering methods to lure users into performing certain actions that may, directly or indirectly, result to malicious routines. Specifically, it makes use of Facebook to post links to malicious websites.To get a o...
This Linux backdoor has increased potential for damage, propagation, or both, that it possesses. Specifically, it is capable of carrying brute force attacks or exploit on the D-Link Internet router.To get a one-glance comprehensive view of the behavi...
Microsoft Internet Explorer is prone to a remote stack overflow vulnerability. An attacker can exploit this issue by creating a specially crafted web page, and sending a link to the use...
This spammed message only contains random letters and a link. These salad words are done probably to bypass spam filters. Once users click on the URL, they are redirected to adult sites. Trend Micro already blocks the said URL. Users are stro...
Trendlabs engineers received mail samples of this spam attack which reads like a woman looking for friends and suitors. It invites the reader to click a link, using the lure of videos and pictures of her as bait. The links, diff...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
Microsoft addresses several vulnerabilities in its June security bulletin. Trend Micro Deep Security covers the following: CVE-2020-1213 - VBScript Remote Code Execution Vulnerability Risk Rating: Cri...
This backdoor may be dropped by other malware.It runs certain commands that it receives remotely from a malicious user. Doing this puts the affected computer and information found on the computer at greater risk.It deletes the initially executed cop...
This spammed message alerts recipients that they are being talked about in a certain blog. It even has a link that supposedly points to the blog entry. Clearly, the perpetrators behind this spam run are leveraging user's fear and curi...
This spammed message purports as Dr. Oz's video on weight loss tricks. It even contains salad or random words at the bottom of the email to bypass spam filters. It has a link that supposedly points on how to lose ...
From: {BLOCKED}illiam@hotmail.comSubject: kshepard skype emailHello {username}Password TokenReset your password with this temporary codeIf the link doesn't work, you can enter the code manually using this token: {random number...
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users.
This resembles typical spam emails selling pharmaceutical products that boost sexual stamina or size. It contains a single link http://{BLOCKED}sinlimites.com.ar/took.html, now blocked by Trend Micro. Users should...
From: Internal Revenue ServiceSubject: Notice of Underreported IncomeTaxpayer ID: paceing-tones-00000174073547UDUSTax Type: INCOME TAXIssue: Unreported/Underreported Income (Fraud Application) Please review...
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users.
This is the Trend Micro detection for emerging threat spreading ransomware through email. Most of ransomware come as a macro or JavaScript attachment, some are delivered as a link in spam email.
This spammed message entices users to check out the sender's bogus photos. It also invites unsuspecting users to chat with the sender by clicking a link. When they clicked this URL, they are red...
Windows 98, ME, NT, 2000, XP, Server 2003 Heuristic DetectionThis is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics as the following malware:WORM_NUWARIf your Trend Micro produ...
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users.