Search
Keyword: possible
Android OS
NOTES: Based on analysis of the codes, this Android malware has the following capabilities: Loads a local html page in 1 pixel iframe. The said html tries to open the following malicious URLs: www.{BLOCKED}z.pl/rc/ jL.{...
* indicates a new version of an existing rule Deep Packet Inspection Rules: Mail Server Common 1012173* - Roundcube Webmail Stored Cross-Site Scripting Vulnerability (CVE-2024-42009) NodeBB 1012382 - NodeBB Stored Cross-Site Sc...
FlawedAmmyy is a remote access Trojan (RAT) based on Ammyy Admin , a legitimate remote access tool used to handle remote control and diagnostics on Microsoft Windows machines. FlawedAmmyy RAT has the functionality of the leaked version, including rem...
This Coinminer arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
* indicates a new version of an existing rule Deep Packet Inspection Rules: DCERPC Services - Client 1010585 - Identified Possible Ransomware File Extension Create Activity Over Network Share - Client Directory Server LDAP 1...
* indicates a new version of an existing rule Deep Packet Inspection Rules: DCERPC Services 1007596* - Identified Possible Ransomware File Extension Rename Activity Over Network Share SolarWinds Network Performance Monitor ...
This is the Trend Micro generic detection for potentially unwanted applications (PUAs) that are installed in your computers or devices. This application is detected as carrying a possible risk of having untoward impact to the user. Note that PUAs' im...
This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement. The host exhibiting this type of network behavior is likely compromised by malware, or being used by a m...
This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement. The host exhibiting this type of network behavior is likely compromised by malware, or being used by a m...
This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement. The host exhibiting this type of network behavior is likely compromised by malware, or being used by a m...
This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement. The host exhibiting this type of network behavior is likely compromised by malware, or being used by a m...
This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement. The host exhibiting this type of network behavior is likely compromised by malware, or being used by a m...
This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement. The host exhibiting this type of network behavior is likely compromised by malware, or being used by a m...
This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement. The host exhibiting this type of network behavior is likely compromised by malware, or being used by a m...
This is Trend Micro detection for SMB network protocol that manifests exploit activities and can be used for Lateral Movement. The host exhibiting this type of network behavior is likely compromised by malware, or being used by a malicious insider to...
This is Trend Micro detection for UDP network protocol that manifests exploit activities and can be used for N/A. The host exhibiting this type of network behavior is likely compromised by malware, or being used by a malicious insider to gain unautho...
This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for N/A. The host exhibiting this type of network behavior is likely compromised by malware, or being used by a malicious insider to gain unauth...
This Worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It requires being executed with a specific argument/parameter, an additional component, or in a specific env...
This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for N/A. The host exhibiting this type of network behavior is likely compromised by malware, or being used by a malicious insider to gain unauth...
This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for N/A. The host exhibiting this type of network behavior is likely compromised by malware, or being used by a malicious insider to gain unauth...