Keyword: sent
300 Total Search   |   Showing Results : 21 - 40
This Trojan may be hosted on a website and run when a user accesses the said website.
This malware is related to the fake flash player scam targeting users in Turkey. It starts with a video link sent via Facebook. This malware specifically pretends as the update and installs the bogus Chrome extension, which blocks antivirus websites....
A denial-of-service vulnerability has been reported in ISC BIND9. The vulnerability is due to improper handling of packets sent to rndc control channel interface. A remote,...
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially executed copy of itself.
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially executed copy of itself.
This adware may be manually installed by a user.
A cross-site scripting vulnerability has been reported in the administrator console of Micro Focus GroupWise. The vulnerability is due to insufficient validation o...
This is one of the vulnerabilities used by the exploit kit, GiefRoot, which Retro Tetris, a malicious Android app downloads onto the device. The said malicious gaming app is pu...
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
Android NOTES: This family is developed based on a leaked banking Trojan source code. The purpose of the malware is to phish account login credentials and bank card information of users in Russia. It will request for the devic...
Ransomware-related URLs are being sent via spam emails by posing as fake Dropbox links. The ruse makes the malicious URL hard to see, and uses the popularity of Dropbox to fool victims. Apart from ma...
We recently received samples of a malicious spam campaign that uses a malicious PDF attachment as its malware infection vector. The mail itself has no body content and appears to be sent fr...
Our engineers caught a spam campaign making the rounds, one that involves a fake legal acknowledgement notification that beseeches the user to digitally sign for. The sample caught contains ...
This is the Trend Micro detection for CEO fraud of Business Email Compromise (BEC) . It is carried out by forging the email accounts of high-level executives, which scammers use to send out a request for wire transfer payments or private business dat...
We spotted spam mail with the subject of New Order , claiming that there's an attached invoice for a new order. The spam mail contains a .DOC file. When a user opens the said document, a macro embedded in the document tr...
We have found a number of fake fax emails finding their way to infect users' machines with ransomware. The body of the email contains a link that, if clicked, directs the user to a ransomware-related site. The email...
Scammers are targeting video conference apps users as they try to lure victims into their schemes. In this particular spam campaign, scammers are sending messages purportedly alerting recipients...
This hacking tool may be manually installed by a user.
Another wave of spam mail carrying EMOTET malware is spreading cheer. Compared to an earlier campaign where EMOTET arrived via banking-related emails, this spam wave pretends to be greeting you....