Keyword: JS_EXPLOIT
10437 Total Search   |   Showing Results : 2701 - 2720
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It takes advantage of certain vulnerabilities. Arrival
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user
link, also in spammed email. Others are delivered by exploit kits. Some others are delivered via malvertisements or compromised websites. To prevent ransomware, users should use protection that also
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes when a user accesses certain websites where
This Trojan may be hosted on a website and run when a user accesses the said website. It requires its main component to successfully perform its intended routine. Arrival Details This Trojan may be
HEUR:Exploit.SWF.Agent.gen (Kaspersky) New Flash Vulnerability CVE-2016-4117 Shares Similarities With Older Pawn Storm Exploit Spammed via email Connects to URLs/IPs
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It takes advantage of software vulnerabilities in certain software to drop malicious
This Trojan may be hosted on a website and run when a user accesses the said website. It requires its main component to successfully perform its intended routine. Arrival Details This Trojan may be
exploit kit Propagation This Trojan does not have any propagation routine. Backdoor Routine This Trojan does not have any backdoor routine. Other Details This Trojan requires its main component to
This is the detection for the third stage malware related to the new Java zero-day exploit that was used in the targeted attack campaign, Operation Pawn Storm. In the first stage of the infection
This Trojan may be hosted on a website and run when a user accesses the said website. It requires its main component to successfully perform its intended routine. Arrival Details This Trojan may be
component bundled with malware/grayware packages. Other Details This Trojan requires its main component to successfully perform its intended routine. It is a zero-day exploit for the following vulnerability:
NOTES: This is the Trend Micro detection for malicious network packets that may manifest any of the following actions: Reading of arbitrary files on the remote system If your Trend Micro product
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user
NOTES: This is the Trend Micro detection for malicious network packets that may manifest any of the following actions: Reading of arbitrary files on the remote system Additional information can be
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user
Description Name: FLASH EXPLOIT - HTTP (Request) . This is Trend Micro detection for packets passing through HTTP network protocols that can be used as N/A. This also indicates a malware infection. Below are some indicators of an infected host:Excess...
Description Name: YERSINIA - ICMP (Request) . This is Trend Micro detection for ICMP network protocol that manifests exploit activities and can be used for N/A.The host exhibiting this type of network behavior is likely compromised by malware, or bei...
Description Name: EXAMINE Buffer Overflow - IMAP4 (Request) . This is Trend Micro detection for IMAP4 network protocol that manifests exploit activities and can be used for Point of Entry.The host exhibiting this type of network behavior is likely co...
Description Name: CRAM-MD5 Authentication Buffer Overflow - IMAP4 (Request) . This is the Trend Micro detection for malicious IMAP4 network packet that manifest any of the following actions:ExploitThis attack is used for Point of Entry