techniques that may lure the customers to unknowingly download a rogue Adobe Flash Player application which is the malware itself. To get a one-glance comprehensive view of the behavior of this Trojan, refer
users to a malicious page wherein an exploit kit abuses certain vulnerabilities in the software in order to force the download of a malware, aka TROJ_JORIK.BRU, onto the users’ systems. This Trojan steals
variants. How does this attack arrive on users’ systems? Users who visit compromised websites injected with the script will be redirected to a URL under the domain lizamoon.com . After this, they will be
then execute ipseccmd.exe which is a legitimate Microsoft file used to configure IP Security Policy, using certain parameters to block communication between the affected machine and certain IP addresses.
Facebook and Twitter messaging to send messages that can convince users to click a link pointing to this malware. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat