Search
Keyword: url
This backdoor connects to a certain URL to send and receive commands from a remote malicious user. It gathers certain information and sends the gathered information via HTTP POST to a specific URL. This backdoor may be dropped by other malware.
This Trojan downloads a possibly malicious file from a certain URL. The URL where this malware downloads the said file depends on the parameter passed on to it by its components.This Trojan arrives on a system as a file dropped by other malware or a...
This Trojan downloads a possibly malicious file from a certain URL. The URL where this malware downloads the said file depends on the parameter passed on to it by its components.This Trojan arrives on a system as a file dropped by other malware or a...
This Coinminer arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Coinminer arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This is the Trend Micro detection for files that contain malicious IFRAME tags. Once a user visits an affected Web page, this HTML script launches a hidden IFRAME that connects to a malicious URL.
This Coinminer arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be dropped by other malware.It uses the system's central processing unit (CPU) and/or graphical ...
This Android malware arrives bundled with modified applications that can be downloaded from unofficial Android Market websites.This backdoor is capable of sending SMS, downloading other applications, adding bookmarks, and visiting URLs. It also gathe...
This spammed message pretends to come from the social networking site, Foursquare. It informs users that someone has added or invited them to the said site and that they need to click first the given URL to approve...
This worm is capable of backdoor commands.Depending on the commands received from the server, it may terminate processes related to security. It may also modify the contents of %System%\drivers\etc\HOSTS to prevent the user from accessing security-re...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be downloaded by other malware/grayware from remote sites.
This Coinminer arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It takes advantage of software vulnerabilities to propagate across networks.It gathers certain informati...
WmRoot/adapter-index.dsp in SAP Business Connector Core Fix 7 and earlier allows remote attackers to conduct spoofing (phishing) attacks via an absolute URL in the url parameter, which loads the ...
Trend Micro engineers spotted a spammed fake Facebook friend notification that leads to malware. The message uses URL cloaking technique, in which the URL redirects to a malicious website and downlo...
This Adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It executes then deletes itself afterward.
This adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This malware uses the exploit targeting (MS13-022) Vulnerability in Silverlight Could Allow Remote Code Execution (2814124) vulnerability. The said exploit was found to be the payload of a series of redirections that started from a website on how ...
This malware roots the device using components employed by ANDROIDOS_LOTOOR.A. However, the said components are encrypted with AES and are decrypted at the time that they are used by using a certain decryption key.It uses its root privilege to insta...
Another round of image spam selling medical items such as Viagra and Cialis has recently been making the rounds in users' inboxes. The image spam comes with a short greeting and salad word quotes in its body. M...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It modifies the user's Internet Explorer home page into a certain website. This action allows the malware t...