Keyword: url
300 Total Search   |   Showing Results : 101 - 120
When visited, this HTML displays a certain message. It then redirects to a specific URL. This then leads to other site redirections, which then displays a fake video.Clicking anywhere on the webpage displays a window asking for Facebook login creden...
Mozilla Firefox 3.0.1 through 3.0.3, Firefox 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13, when running on Windows, do not properly identify the context of Windows .url shortcut files, which a...
This malware is able to send an SMS to a Chinese premium number. As a result, affected users are charged without their knowledge.To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.This Troja...
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users.
The URL validation functionality in Microsoft Internet Explorer 5.01, 6, 6 SP1, 7 and 8, and the ShellExecute API function in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP2, does not...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user accesses the said website.Once a user visits an affected...
This Trojan accesses a certain URL to obtain the link where to download a file and its file name.It then executes the downloaded file. However, as of this writing, the said URL is no longer accessible.This Trojan arrives on a system as a file droppe...
This Hacking Tool arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It does not have any propagation routine.It does not have any backdoor routine.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. It may be hosted on a website and run when a user accesses the said website.This is the Trend Micro detection for files that contain malicious IFRAME tags. Once a...
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This worm arrives by connecting affected removable drives to a system. It may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites.It drops copies of itself into all the removable drives connected...
This Trojan may be hosted on a website and run when a user accesses the said website.Once a user visits an affected Web page, this HTML script launches a hidden IFRAME that connects to a malicious URL.
This Trojan may be hosted on a website and run when a user accesses the said website.Once a user visits an affected Web page, this HTML script launches a hidden IFRAME that connects to a malicious URL.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user accesses the said website.
This hacking tool may be manually installed by a user.
Windows NOTES: This is the Trend Micro detection for Web pages that were compromised through the insertion of a certain malicious script. The script checks for the affected system's Web Browser and its version. It then generates a r...
This trojan is a specially crafted Advanced Streaming Format (ASF) file which when opened in Windows Media Player connects to certain URLs. The URL visited will then redirect the user to another URL that steals user information.
This Hacking Tool may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.