Search
Keyword: link
This is Trend Micro's detection for HTML files inserted with malicious JavaScripts that could lead to the download of other possibly malicious files. It may contain hidden iframe tags to link to other websites.Once users visit a compromised site, the...
<P>This worm is the Trend Micro detection name for the Mehika <i>Twitter</i> botnet binary. Cybercriminals used a <i>Twitter</i> account in order to send commands to this botnet's ...
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be manually installed by a user.
Social networking is a tool to connect with friends and family. But for cybercriminals, sites like Facebook and Twitter are emerging platforms to target users. Scams continuously lure users to ad track...
It may be executed using command-line and specific parameters. It sends ICMP PING requests to random IP addresses and scans for Port 4899 (Radmin Port) to check if those IP addresses have RADMIN service running. Once successful, it uses the following...
This worm arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It gather...
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Backdoor uses a user interface (UI).
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.This is the Trend Micro detection for files that exhibit certain behaviors.
This Trojan uses social engineering methods to lure users into performing certain actions that may, directly or indirectly, cause malicious routines to be performed. Specifically, it takes advantage of Google search function, wherein it returns a lin...
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.This is the Trend Micro detection for files that exhibit certain behaviors.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.This is the Trend Micro detection for files that exhibit certain behaviors.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.This is the Trend Micro detection for files that exhibit certain behaviors.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.This is the Trend Micro detection for files that exhibit certain behaviors.
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users.
This Trojan may be hosted on a website and run when a user accesses the said website.It downloads a file from a certain URL then renames it before storing it in the affected system. It executes the downloaded files. As a result, malicious routines o...
Apple Safari For Windows Long Link DoS
There is a vulnerability in Apple Safari. Attackers can exploit this issue by enticing user to visit malicious web page.
Apply associated Trend Micro DPI Rules.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It does not have any propagation routine.It does not have any backdoor routine.It steals certain informatio...
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.