Search
Keyword: URL
This Coinminer arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It uses the system's central processing unit (CPU) and/or graphical processing unit (GPU) resources to m...
This Trojan may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
SYSIE or also known as Rabasheeta is a Trojan which opens a backdoor on a compromised computer. This malware drops a main module and a configuration file. The configuration file of SYSIE contains the board category, BBS ID, and the URL where this mal...
This is the first known Android malware that reads blog posts and interprets these as commands. It can also download and install additional applications, therefore further compromising the affected device.To get a one-glance comprehensive view of the...
This Trojan may arrive bundled with malware packages as a malware component. It may be hosted on a website and run when a user accesses the said website.It downloads a file from a certain URL then renames it before storing it in the affected system....
This malware is related to a spammed message that leverages the news on “Royal Baby." The said spammed message lures users in accessing the related blog which is in actual redirects to a malicious URL. To get a one-glance compre...
SYSIE or also known as Rabasheeta is a Trojan which opens a backdoor on a compromised computer. This malware drops a main module and a configuration file. The configuration file of SYSIE contains the board category, BBS ID, and the URL where this mal...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
The MPC::HexToNum function in helpctr.exe in Microsoft Windows Help and Support Center in Windows XP and Windows Server 2003 does not properly handle malformed escape sequences, w...
This Trojan may be hosted on a website and run when a user accesses the said website.
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users.However, as of this writing, the said sites are inaccessible.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.However, as of this writing, the said sites are inaccessible.
Citrix XenCenterWeb is vulnerable to cross-site scripting, caused by improper validation of user-supplied input. A remote attacker could exploit this vulnerability using a specially-crafte...
Microsoft Internet Explorer 9 and earlier does not properly restrict cross-zone drag-and-drop actions, which allows user-assisted remote attackers to read cookie files via vectors involving an ...
This spammed message purports to come from Federal Reserve Bank. It informs users to review the ACH note, which they can view by visiting a certain URL. Once users clicked on the URL, they are redirec...
The movie Ender's Game, based on a novel of the same name, did not escape cybercriminals' sights. Trend Micro researchers spotted Blackhole Exploit Kit spam campaign using the movie's name.
The spamme...
This Trojan executes when a user accesses certain websites where it is hosted.It executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the affected system.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It modifies files, disabling programs and applications from properly running.