Keyword: link
300 Total Search   |   Showing Results : 1 - 20
   Next  
This is the Trend Micro detection for emerging threat spreading ransomware through email. Most of ransomware come as a macro or JavaScript attachment, some are delivered as a link in spam email.
This Trojan may be dropped by other malware. It takes advantage of certain vulnerabilities.
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Coinminer arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain websites to send and receive information. However, as of this writing, the said ...
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution.
This malware downloads a malicious script detected as HTML_BLOCKER.K, which is used to send the Facebook messages with the link to the video. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown bel...
This Trojan targets routers and attempts to log in to all the devices connected to the routers. It pretends to be an Adobe Flash update. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below. T...
Different variants of fake Paypal notice emails were found in recent circulation. The contents of the email included the recipient’s name, PayPal ID, payment amounts, as well as the malicious link. The link ...
This malware shows fake message inside the PDF tricking the users to click on the link. This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other ma...
This malware shows fake message inside the PDF tricking the users to click on the link. This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other ma...
This Trojan guesses the password of TP-LINK router's administrator account. If it succeeds, it simulates the browser's behavior to change the router's DNS to its rogue server . Because normally Wi-Fi routers make the devices connected to it use the s...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
We recently have observed a spam campaign being delivered to users in the form of a purchase invoice that claims to be from the e-commerce company, eBay. Recipients of this fake invoice will see details ...
We have found a number of fake fax emails finding their way to infect users' machines with ransomware. The body of the email contains a link that, if clicked, directs the user to a ransomware-related site. The email...
This worm uses social engineering methods to lure users into performing certain actions that may, directly or indirectly, cause malicious routines to be performed. Specifically, it makes use of spam messages disguised as electronic greeting cards. To...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. This is the Trend Micro detection for files that exhibit certain behaviors.
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. This is the Trend Micro detection for files that exhibit certain behaviors.
The abuse of cloud sharing services such as Google Drive and Google Docs was last seen in March 2023, in which threat actors targeted Latin American countries, distr...