Keyword: JS_EXPLOIT
10610 Total Search   |   Showing Results : 101 - 120
the following User Agent: JustOnlineUpdateLiClient It does not have rootkit capabilities. It does not exploit any vulnerability. Trojan.Downloader.JRUH (BitDefender), Trojan.Downloader.JRUH (F-Secure)
This Trojan may be hosted on a website and run when a user accesses the said website. It executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the
artists. This led Oracle to finally release of an out-of-band patch through an updated version of Java . How does this threat get into users' systems? The JavaScript exploit detected as JS_WEBSTART.A may be
JS_EXPLOIT.MEA accesses the following websites to download a file, detected as BKDR_POISON.MEA. JS_EXPLOIT.MEA was inserted onto a legitimate website of the US Department of Labor and downloads a
This Trojan may be hosted on a website and run when a user accesses the said website. As of this writing, the said sites are inaccessible. Arrival Details This Trojan may be hosted on a website and
However, as of this writing, the said sites are inaccessible. Other Details This Trojan attempts to access the following Web sites to download files, which are possibly malicious: http://{BLOCKED
This Trojan may be hosted on a website and run when a user accesses the said website. It takes advantage of software vulnerabilities to allow a remote user or malware/grayware to download files.
GUMBLAR to compromise more websites. In addition, some GUMBLAR variants contained embedded KATES binary in their bodies, which they dropped directly without the aid of exploit components. It may also
This Trojan may be hosted on a website and run when a user accesses the said website. It executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the
This is the Trend Micro detection for files that exhibit certain behaviors. This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It may be hosted on a website and run
Once a malware successfully exploits the said vulnerability, it causes certain actions to be done on the system. As of this writing, the said sites are inaccessible. This Trojan may be unknowingly
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. However, as of this writing, the said sites are
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It requires being executed with a specific
The said site (where users can get this malware) may also be accessed by the following malware: JS_OBFUS.VTGD This Trojan arrives on a system as a file dropped by other malware or as a file
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
execute its routine upon activation by the user: Upon execution of this malicious embedded JS file, it displays the following message box to trick the user: It does not have rootkit capabilities. It does
execute its routine upon activation by the user: Upon execution of this malicious embedded JS file, it displays the following message box to trick the user: It does not have rootkit capabilities. It does
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. Arrival Details This Trojan arrives as an attachment to email messages spammed by other
This Trojan may be hosted on a website and run when a user accesses the said website. This is the Trend Micro detection for files that contain malicious IFRAME tags. It redirects browsers to certain
This Trojan executes when a user accesses certain websites where it is hosted. This is the Trend Micro detection for Web pages that were compromised through the insertion of a certain IFRAME tag. It