Search
Keyword: link
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This malware is related to the discovery of the malicious use of the Insert and Link feature in Microsoft Office. Users affected by this malware may have malicious routines exhibited on their systems. To get a one-glance comprehensive view of the beh...
We spotted a recent spam campaign in Italian that delivers URSNIF malware to unsuspecting users. The email deceives its recipients by posing as a notification with a link that leads to the supposed receip...
This Trojan arrives as an attachment to email messages mass-mailed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It...
This Trojan arrives as an attachment to email messages mass-mailed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It...
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It ste...
A cross-site scripting (XSS) vulnerability exists in Link Library plugin, used in WordPress, allow remote attackers to execute same-origin JavaScript functions via crafted parameter.
Ap...
In our reseach, we stumbled upon a huge volume of spam posing as a weight loss advert. The click here in the spam message's body leads to a malicious website http://{BLOCKED}-25.com/?u=mlf80k9&o=fp2kvzu...
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to a website to send and receive information. It downloads a file from a certain URL then re...
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users.
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users.
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
We recently have observed a spam campaign being delivered to a number of users who allegedly are recipients of a bank confirmation. The email body contains an embedded link that, if clicked, will...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. This is the Trend Micro detection for files that exhibit certain behaviors.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. This is the Trend Micro detection for files that exhibit certain behaviors.
A spam campaign has been seen to contain a link that leads unsuspecting users to a scam website. The spammed message claims to come from FedEx and informs the user that there is a problem with their d...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.