Keyword: link
300 Total Search   |   Showing Results : 261 - 280
It drops a file, which functions as a shortcut link to its dropped copy. This Trojan may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It displays fake alerts that warn users of infection....
This is the Trend Micro generic detection for web threats. If you're browsing a website which has been detected as a web threat, the website is possibly compromised and injected with malicious scripts or files. The injected script or file may be deli...
This is the Trend Micro generic detection for web threats. If you're browsing a website which has been detected as a web threat, the website is possibly compromised and injected with malicious scripts or files. The injected script or file may be deli...
This Trojan arrives as a component bundled with malware/grayware packages. It may be downloaded from remote sites by other malware.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
Windows 98, ME, NT, 2000, XP, Server 2003 Heuristic Detection This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics as the following malware: WORM_NUWAR TROJ_NUWAR TROJ_TIBS WO...
Windows 98, ME, NT, 2000, XP, Server 2003 Heuristic Detection This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics as the following malware: TROJ_TIBS TROJ_NUWAR WORM_NUWAR WO...
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It redirects browsers to certain sites. However, as of this writing, the said sites are inaccessible.
This Rootkit arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This worm arrives via removable drives. It drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the drives of an affected system.
EMOTET continues to spread, using different techniques and relevant events. This December 2019, we observed the rise of malicious spam containing links or password-protected attachments bringing EMOT...
We observed a spam campaign that has been using Microsoft-related templates such as Office 365 and SharePoint notifications to spread new malware since September 2021. Along with usual l...
* indicates a new version of an existing rule Deep Packet Inspection Rules: NFS Server 1011740* - Microsoft Windows Network File System Remote Code Execution Vulnerability (CVE-2023-24941) Unix Samba 1011717* - Linux Kernel KSM...
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user, effectively compromising the affected system.
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It att...
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.