Keyword: link
300 Total Search   |   Showing Results : 1 - 20
   Next  
This is the Trend Micro detection for emerging threat spreading ransomware through email. Most of ransomware come as a macro or JavaScript attachment, some are delivered as a link in spam email.
In our reseach, we stumbled upon a huge volume of spam posing as a weight loss advert. The click here in the spam message's body leads to a malicious website http://{BLOCKED}-25.com/?u=mlf80k9&o=fp2kvzu...
Different variants of fake Paypal notice emails were found in recent circulation. The contents of the email included the recipient’s name, PayPal ID, payment amounts, as well as the malicious link. The link ...
This Trojan may be dropped by other malware. It takes advantage of certain vulnerabilities.
This malware shows fake message inside the PDF tricking the users to click on the link. This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other ma...
This malware shows fake message inside the PDF tricking the users to click on the link. This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other ma...
This Trojan guesses the password of TP-LINK router's administrator account. If it succeeds, it simulates the browser's behavior to change the router's DNS to its rogue server . Because normally Wi-Fi routers make the devices connected to it use the s...
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Coinminer arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain websites to send and receive information. However, as of this writing, the said ...
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution.
This Trojan targets routers and attempts to log in to all the devices connected to the routers. It pretends to be an Adobe Flash update. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below. T...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
We recently have observed a spam campaign being delivered to users in the form of a purchase invoice that claims to be from the e-commerce company, eBay. Recipients of this fake invoice will see details ...
We have found a number of fake fax emails finding their way to infect users' machines with ransomware. The body of the email contains a link that, if clicked, directs the user to a ransomware-related site. The email...
A cross-site scripting (XSS) vulnerability exists in Link Library plugin, used in WordPress, allow remote attackers to execute same-origin JavaScript functions via crafted parameter. Ap...
This backdoor is seen propagating via CVE-2018-18636, a cross-site scripting vulnerability affecting the wireless router D-Link DSL-2640T. This malware is capable of receiving commands to flood other systems. This Backdoor arrives on a system as a f...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. This is the Trend Micro detection for files that exhibit certain behaviors.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. This is the Trend Micro detection for files that exhibit certain behaviors.
The abuse of cloud sharing services such as Google Drive and Google Docs was last seen in March 2023, in which threat actors targeted Latin American countries, distr...