Search
Keyword: link
300 Total Search |
Showing Results : 1 - 20
This Trojan may be dropped by other malware.It takes advantage of certain vulnerabilities.
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Coinminer arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It connects to certain websites to send and receive information. However, as of this writing, the said s...
This HTML script uses social engineering methods to lure users into performing certain actions that may, directly or indirectly, cause malicious routines to be performed. Specifically, it poses as a Facebook stalker finder to be able to infect Facebo...
This latest spam sample comes with a link that tries to encourages the recipient to click the embedded link. Doing so would supposedly provide information about a girl who wants to get married and on what posters are say...
The team received a mail sample recently, with the body of the mail written in Portuguese. Upon analysis, we discovered that the mail's FROM headers does not contain the same email...
There exists a persistent stored cross site scripting vulnerability, also known as a stored XSS, in the Broken Link Checker. Stored XSS occurs when a web application gathers pote...
Link spam makes its return with this most recent sample that tries to lure unsuspecting users into clicking a malicious link by exploiting the worldwide event known as International Women's Day, a global cel...
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
Cybercriminals are always on the heels of anything popular, anything that can hook users. In this spammed message, cybercriminals use WhatsApp, an instant messaging app available for iO...
For Electronic Arts (EA) gamers, Origin is a familiar site - allowing gamers to purchase and download games online. Cybercriminals are also taking advantage of this site. Trend Micro researchers analyzed a spam messa...
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It deletes itself after execution.
This Trojan is hosted on a certain site. It arrives via clicking on malicious links spammed on Facebook. Once the user clicks the link, a page will be displayed with thumbnails of pornographic videos. Clicking on the videos displays a window asking f...
From: ahoo {Japanese characters}, Levi BarnesSubject: Check out the Emporio Armani watches!Dear Karla,
If you've waited to get your Ro lex watch, this is the right time to go for it.http:// {BLOCKED}.yahoo.com/search?y...
This spammed message uses sex-enhancing drug, Viagra, on the subject line to provoke men to open it. Once opened, the body includes only a link and a confidentiality footer, which is there to make it look like the link came from...
Due to the popularity of file hosting service Dropbox, it is no surprise that cybercriminals leverage this platform to proliferate their malicious activities. We recently spotted a spam run that purports as a...
This Trojan targets routers and attempts to log in to all the devices connected to the routers. It pretends to be an Adobe Flash update.To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.Thi...
News of Osama bin Laden’s death took the worldwide Web by storm, filling blogs and social networking sites like Facebook and Twitter with details on how the al-Qaeda founder died. The attentio...
This spammed message poses as a notification for banking and payment services, Discover Financial Services. It coaxes users to click on a link to an important message about their Discover card...
This Trojan may be hosted on a website and run when a user accesses the said website.