Search
Keyword: url
300 Total Search |
Showing Results : 1 - 20
This is the Trend Micro detection for URLs with low reputation. This detection is based on heuristic rules and analysis. This indicates that there is a potential risk in your computer's network.
This file contains a URL where it connects to possibly download other files.
This Trojan is downloaded from specific remote sites. It connects to a possibly malicious URL.
This detection is for web threats related to malicious URL redirectors. It is common for web threats to redirect URLs to avoid detection. An example is using meta refresh and HTTP status codes of 3XX. Other examples are using scripts like Javascript,...
This is the Trend Micro detection for phishing emails that pretend to be sent from a known or popular brand. The phishing email attempts to lure recipients to click the URL in the content or open the email attachment. Usually, clicking the URL redire...
This Trojan connects to certain websites to send and receive information. It executes certain actions WITHIN the affected computer. When users agree to buy the software, it connects to a certain URL.
This Trojan may be hosted on a website and run when a user accesses the said website. Once a user visits an affected Web page, this HTML script launches a hidden IFRAME that connects to a malicious URL.
This Trojan may be hosted on a website and run when a user accesses the said website. Once a user visits an affected Web page, this HTML script launches a hidden IFRAME that connects to a malicious URL.
This Trojan may be hosted on a website and run when a user accesses the said website. Once a user visits an affected Web page, this HTML script launches a hidden IFRAME that connects to a malicious URL.
This Trojan may be hosted on a website and run when a user accesses the said website. Once a user visits an affected Web page, this HTML script launches a hidden IFRAME that connects to a malicious URL.
This Trojan may be hosted on a website and run when a user accesses the said website. Once a user visits an affected Web page, this HTML script launches a hidden IFRAME that connects to a malicious URL.
This Trojan may be hosted on a website and run when a user accesses the said website. Once a user visits an affected Web page, this HTML script launches a hidden IFRAME that connects to a malicious URL.
This Trojan may be hosted on a website and run when a user accesses the said website. Once a user visits an affected Web page, this HTML script launches a hidden IFRAME that connects to a malicious URL.
This Trojan Spy downloads a file from a certain URL then renames it before storing it in the affected system. It retrieves specific information from the affected system. It connects to certain websites to send and receive information.
This Trojan may be hosted on a website and run when a user accesses the said website. Once a user visits an affected Web page, this HTML script launches a hidden IFRAME that connects to a malicious URL.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It downloads a file from a certain URL then renames it before storing it in the affected system.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It downloads a file from a certain URL then renames it before storing it in the affected system.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It downloads a file from a certain URL then renames it before storing it in the affected system.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It downloads a file from a certain URL then renames it before storing it in the affected system.
This Trojan may be hosted on a website and run when a user accesses the said website. Once a user visits an affected Web page, this HTML script launches a hidden IFRAME that connects to a malicious URL. However, as of this writing, the said sites ar...