Keyword: link
300 Total Search   |   Showing Results : 41 - 60
We recently received different spammed messages which all contain links leading to malware. The first message pretends to be a hotel confirmation message with a link to download their “electronic hotel reservati...
This worm uses social engineering methods to lure users into performing certain actions that may, directly or indirectly, cause malicious routines to be performed. Specifically, it makes use of spam messages disguised as electronic greeting cards. To...
This Trojan has received attention from independent media sources and/or other security firms.To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.This Trojan may arrive bundled with malware p...
This malware is related to the discovery of the malicious use of the Insert and Link feature in Microsoft Office. Users affected by this malware may have malicious routines exhibited on their systems.To get a one-glance comprehensive view of the beha...
This update resolves a privately reported vulnerability in Active Directory Certificate Services Web Enrollment. The vulnera...
Background of the Attack On September 9, 2010, Trend Micro received reports of a spammed message that contained a clickable link that led to a worm. The spammed messages used any of these followin...
It sends a GET request to the server to download encrypted data. The encrypted data contains information on its spamming routine. It sends spam mails containing links where other malware can be downloaded. This malware also displays information on it...
A cross-site scripting (XSS) vulnerability exists in Link Library plugin, used in WordPress, allow remote attackers to execute same-origin JavaScript functions via crafted parameter. ...
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This spammed message pictures an attractive woman attracting young men for romance and care. It contains a link at the end of a short message. Trend Micro blocks the message and the link. Users are advised not to reply nor click any links on...
Like other spammed messages, this one acts like a friend just sending you a link of photos on a site. The link http://{BLOCKED}gues.com/chuanne2, is now blocked by Trend Micro. Users are advised not to click on links from pers...
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users.
This spammed message simply informs users that they received a new message. To make the email message seemingly legitimate, the spammers put 'secure message' for its From field. It has a link that supposedly points to the message...
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users.
This spammed message poses as a friend informing a user of a job opportunity in the area. It contains a link to a supposed feature article which Trend Micro already started blocking. Even if the subject or tone of the message appea...
This Trojan arrives as an attachment to email messages mass-mailed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It ...
This Trojan arrives as an attachment to email messages mass-mailed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It ...