Search
Keyword: sent
This malware is related to the fake flash player scam targeting users in Turkey. It starts with a video link sent via Facebook. This malware specifically pretends as the update and installs the bogus Chrome extension, which blocks antivirus websites....
A denial-of-service vulnerability has been reported in ISC BIND9. The vulnerability is due to improper handling of packets sent to rndc control channel interface. A remote,...
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially executed copy of itself.
This adware may be manually installed by a user.
A cross-site scripting vulnerability has been reported in the administrator console of Micro Focus GroupWise. The vulnerability is due to insufficient validation o...
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
Android
NOTES: This family is developed based on a leaked banking Trojan source code. The purpose of the malware is to phish account login credentials and bank card information of users in Russia. It will request for the devic...
Ransomware-related URLs are being sent via spam emails by posing as fake Dropbox links. The ruse makes the malicious URL hard to see, and uses the popularity of Dropbox to fool victims. Apart from ma...
We recently received samples of a malicious spam campaign that uses a malicious PDF attachment as its malware infection vector. The mail itself has no body content and appears to be sent fr...
Our engineers caught a spam campaign making the rounds, one that involves a fake legal acknowledgement notification that beseeches the user to digitally sign for. The sample caught contains ...
This is the Trend Micro detection for CEO fraud of Business Email Compromise (BEC) . It is carried out by forging the email accounts of high-level executives, which scammers use to send out a request for wire transfer payments or private business dat...
We spotted spam mail with the subject of New Order , claiming that there's an attached invoice for a new order. The spam mail contains a .DOC file. When a user opens the said document, a macro embedded in the document tr...
We have found a number of fake fax emails finding their way to infect users' machines with ransomware. The body of the email contains a link that, if clicked, directs the user to a ransomware-related site. The email...
Scammers are targeting video conference apps users as they try to lure victims into their schemes. In this particular spam campaign, scammers are sending messages purportedly alerting recipients...
This hacking tool may be manually installed by a user.
Another wave of spam mail carrying EMOTET malware is spreading cheer. Compared to an earlier campaign where EMOTET arrived via banking-related emails, this spam wave pretends to be greeting you....
Android OS
NOTES: GreyWolf family is found in an underground forum for malware authors. The malware disguises itself using names like love profess app . After the victim installs the app, it locks the interface after rebooting....
SIMBOT is a backdoor family that accesses certain remote servers in order to receive commands from a remote attacker. The following are the executed commands on the affected system: Download and executes files Execute a DOS command sent by the remote...
This is the Trend Micro detection for cousin domain tactics in a fraudulent email message. A cousin or lookalike domain is a domain that looks deceptively similar to a legitimate target domain. Cousin domains are often used in phishing or business e...