Search
Keyword: url
This Trojan may be hosted on a website and run when a user accesses the said website. Once a user visits an affected Web page, this HTML script launches a hidden IFRAME that connects to a malicious URL. However, as of this writing, the said sites ar...
This is the Trend Micro detection for PDF files which shows fake messages when opened. It requires user to click the image in the PDF file. Once clicked, it accesses a URL. This Trojan arrives as an attachment to email messages spammed by other malw...
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It downloads a file from a certain URL then renames it before storing it in the affected system. It dr...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. When users agree to buy the software, it connects to a certain URL. It displays a window where users can p...
This Trojan may be hosted on a website and run when a user accesses the said website. This is the Trend Micro detection for files that contain malicious IFRAME tags. Once a user visits an affected Web page, this HTML script launches a hidden IFRAME ...
This Trojan executes when a user accesses certain websites where it is hosted. This is the Trend Micro detection for files that contain malicious IFRAME tags. Once a user visits an affected Web page, this HTML script launches a hidden IFRAME that co...
This Trojan executes when a user accesses certain websites where it is hosted. This is the Trend Micro detection for files that contain malicious IFRAME tags. Once a user visits an affected Web page, this HTML script launches a hidden IFRAME that co...
This backdoor is downloaded and installed in systems via malicious URL. It is installed with a miner. This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It downloads a file from a certain URL then renames it before storing it in the affected system. As of thi...
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to a website to send and receive information. It downloads a file from a certain URL then re...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It downloads a file from a certain URL then renames it before storing it in the affected system. It connec...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. When users agree to buy the software, it connects to a certain URL. It ...
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It downloads a file from a certain URL then renames it before storing it in the affected system. It co...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. This file contains a URL where it connects to possibly download other files. However, as of this writing, ...
This Trojan may be hosted on a website and run when a user accesses the said website. This is the Trend Micro detection for files that contain malicious IFRAME tags. Once a user visits an affected Web page, this HTML script launches a hidden IFRAME ...
This Trojan may be hosted on a website and run when a user accesses the said website. This is the Trend Micro detection for files that contain malicious IFRAME tags. Once a user visits an affected Web page, this HTML script launches a hidden IFRAME ...
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be unknowingly downloaded by a user while visiting malicious websites. It downloads a file from a certain URL then renames it before ...
This Adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be manually installed by a user. This file contains a URL where it connects to possibly download ot...
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be unknowingly downloaded by a user while visiting malicious websites. It downloads a file from a certain URL then renames it before ...
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be unknowingly downloaded by a user while visiting malicious websites. It downloads a file from a certain URL then renames it before ...