Keyword: link
300 Total Search   |   Showing Results : 161 - 180
A vulnerability exists in Windows Media Center that could allow remote code execution if Windows Media Center opens a specially crafted Media Center link (.mcl) file t...
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. However, as of this writing, the said sites are inaccessible.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
We recently received samples of a malicious spam campaign that uses a malicious PDF attachment as its malware infection vector. The mail itself has no body content and appears to be sent fr...
Similar to EMOTET’s arrival, Trojan spyware Azurolt has been spotted coming in the form of a spoofed bank notification. The spam campaign is making the rounds in Germany and UK. The email prompts the user...
We have observed a new spam wave delivering Trickbot. This campaign uses spam mail with malicious attachments disguised as a Microsoft Excel file. The message contains fake payment notification, claiming to be from ...
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Ransomware encrypts files with specific file extensions. It encrypts files found in specific folders.
This Trojan Spy may be dropped by other malware. It executes commands from a remote malicious user, effectively compromising the affected system. It connects to certain websites to send and receive information.
An observable spike of spam samples attempting to phish Wells Fargo users in June 2020. This spam campaign unusually uses .ICS files as attachments. These samples lure the recipient into ...
This Trojan may be dropped by other malware.
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. This is the Trend Micro detection for files that exhibit certain behaviors. However, as of this writing, t...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
Our engineers caught a spam campaign making the rounds, one that involves a fake legal acknowledgement notification that beseeches the user to digitally sign for. The sample caught contains ...
Spam campaigns, carrying links or malicious .doc files, exploiting the Microsoft Office vulnerability known as CVE-2017-11882 is spreading in Australia and Japan. The...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. However, as of this writing, the said sites are inaccessible.
A recent spam outbreak we have observed involved email disguised as an invoice for a certain purchase order and pretends to be coming from legitimate companies such as Telstra or Cathay Pacific . However, sim...
A number of users may receive an email on a supposed confirmation for their parcel delivery. This spammed message contains a .zip file that has another .zip file in it. The said .zip file has a .lnk (a file ...
This Trojan arrives as attachment to mass-mailed email messages. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. This is the Trend Micro detection for files that e...