Keyword: JS_EXPLOIT
10610 Total Search   |   Showing Results : 41 - 60
This Trojan may be hosted on a website and run when a user accesses the said website. This is the Trend Micro detection for files that contain malicious IFRAME tags. Once a user visits an affected
{BLOCKED}ruppe.de/typo3/YN7MxKpZ.php However, as of this writing, the said sites are inaccessible. NOTES: It does not have rootkit capabilities. It does not exploit any vulnerability. Exploit:JS/Blacole.ND
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user
This malware exploits a vulnerability in Internet Explorer to enable remote attackers to execute arbitrary commands on the affected system. The said vulnerability is addressed in the bulletin
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It does not
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
have rootkit capabilities. It does not exploit any vulnerability. Exploit:JS/Blacole.GB (Microsoft), JS/Exploit-Blacole.a!heur !! (McAfee) Connects to URLs/IPs
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user
This is a specially crafted PDF which takes advantage of a recent vulnerability in Adobe (CVE-2013-0641) to drop MiniDuke malware. To get a one-glance comprehensive view of the behavior of this
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the dropped file(s). As a result, malicious
This Trojan may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may be hosted on a website and run when a user accesses the said website. Download
This malware is a JavaScript component of the Blackhole Exploit kit. It is responsible for searching vulnerable software on the user's machine in order to deploy specific exploits and ultimately,
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes when a user accesses certain websites where
http://{BLOCKED}media.com/HRP1EkFL/js.js The said sites then lead to the following site which hosts a Blackhole Exploit Kit: http://{BLOCKED}.{BLOCKED}.172.153/ As a result, several exploit malware,
generates a psuedorandom string to be used for the domain name of the URL it connects to. It does not have rootkit capabilities. It does not exploit any vulnerability. Trojan:JS/BlacoleRef.W (Microsoft),
(Fortinet) Technical Analysis of CVE-2012-1889 Exploit HTML_EXPLOYT.AE Part 1 Technical Analysis of CVE-2012-1889 Exploit HTML_EXPLOYT.AE Part 2 Technical Analysis of CVE-2012-1889 Exploit HTML_EXPLOYT.AE
This Trojan may be hosted on a website and run when a user accesses the said website. However, as of this writing, the said sites are inaccessible. Once a compromised site is visited, the user is
cybercriminals looking to further their malicious money-making machinations will seek to exploit all of the vulnerabilities present in the most efficient way possible. HTML_SHELLCOD.SM , a recently discovered