Search
Keyword: browser hijacker
This adware may be dropped by other malware.It modifies the user's Internet Explorer home page into a certain website. This action allows the malware to point to a website which may contain malware, putting the affected computer at greater risk of m...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It arrives as a component bundled with malware/grayware packages.
Cybercriminals are always on the heels of anything popular, anything that can hook users. In this spammed message, cybercriminals use WhatsApp, an instant messaging app available for iO...
This Trojan opens an instance of the browser to access a certain website.This Trojan may be unknowingly downloaded by a user while visiting malicious websites.It connects to certain URLs. It may do this to remotely inform a malicious user of its ins...
This Trojan executes when a user accesses certain websites where it is hosted.
Windows
NOTES: This is the Trend Micro detection for Web pages that were compromised through the insertion of a certain malicious script.
The script checks for the affected system's Web Browser and its version. It then generates a r...
Android OS
NOTES: This malware is distributed via social networking sites that leveraged the Umbrella Revolution protesters in Hong Kong.
When users unknowingly install and open it, the malware is hidden from the launcher. Howev...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It does not have any propagation routine.It does not have any backdoor routine.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
URSNIF is a family of spyware notorious for adopting different behaviors from other malware types (e.g., backdoors, file infectors). This is a trait allows the malware to avoid detection, enhancing the effectiveness of its info-st...
This Trojan may arrive bundled with malware packages as a malware component. It may be downloaded unknowingly by a user when visiting malicious website(s).
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It acts as a Browser Helper Object (BHO) that monitors a user's Internet-browsing habits.It requires its ma...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This is the Trend Micro detection for worm that replaces the master boot record (MBR), limiting access to the affected computer. It may also cause systems to crash, rendering your computer useless.This worm arrives by accessing affected shared netwo...
This adware may arrive bundled with malware packages as a malware component. It may be manually installed by a user.