Keyword: browser hijacker
6652 Total Search   |   Showing Results : 361 - 380
This adware may be unknowingly downloaded by a user while visiting malicious websites. It may be manually installed by a user.
Trend Micro has flagged this hacking tool as noteworthy due to the increased potential for damage, information theft, or both, that it possesses. Specifically, it is a form of a proof-of-concept hack with sidejacking capabilities, which can potential...
This Trojan arrives as a component bundled with malware/grayware packages.
This Trojan arrives as a component bundled with malware/grayware packages.
This Trojan may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run ...
This Trojan arrives as a component bundled with malware/grayware packages.
This Trojan arrives as a component bundled with malware/grayware packages.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It does not have any propagation routine.It does not have any backdoor routine.However, as of this writing,...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It does not have any propagation routine.It does not have any backdoor routine.It does not have any informa...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It does not have any propagation routine.It does not have any backdoor routine.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It does not have any propagation routine.It does not have any backdoor routine.However, as of this writing,...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It does not have any propagation routine.It does not have any backdoor routine.However, as of this writing,...
This Trojan may be hosted on a website and run when a user accesses the said website.Once a user visits an affected Web page, this HTML script launches a hidden IFRAME that connects to a malicious URL.
This is a detection from the Trend Micro Predictive Machine Learning mechanism. It uses advanced machine learning technology to correlate threat information and perform in-depth analysis to detect emerging unknown security risks. It does this through...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
It drops AUTORUN.INF file to enable the automatic execution of the main executable file whenever infected drives are accessed.This worm may be dropped by other malware.It acts as a Browser Helper Object (BHO) that monitors a user's Internet-browsing...
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.