Search
Keyword: VBS_DELF
Description Name: DELF - TCP (Request) . This is Trend Micro detection for packets passing through TCP network protocols that can be used as Command and Control Communication. This also indicates a malware infection. Below are some indicators of an i...
Description Name: DELF - HTTP (Request) . This is Trend Micro detection for packets passing through HTTP network protocols that can be used as Command and Control Communication. This also indicates a malware infection. Below are some indicators of an...
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Backdoor arrives on a system as a
More news on the malicious spam front - we recently received two waves of what appears to be malformed malspam. The first one has 'Supplement payment [Random Number]' for its subject heading, while
http://sjc1-te-cmsap1.sdi.trendnet.org/dumpImages/139201073912.jpeg Background of the Attack On September 9, 2010, Trend Micro received reports of a spammed message that contained a clickable link
http://SJC1-TE-CMSAP1.sdi.trendnet.org/dumpImages/24112013724.jpeg Although cybercriminals continuously refine their techniques, old tricks remain to be efficient in infecting user systems. One such
http://sjc1-te-cmsap1.sdi.trendnet.org/dumpImages/06120107955.jpeg How does this threat get into users' systems? This threat arrives via spammed messages containing a malicious link that led users to
http://sjc1-te-cmsap1.sdi.trendnet.org/dumpImages/096201093327.jpeg Background of the Attack In a recent spam run, messages purporting to be an IT notification targeted several companies worldwide.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
The PHER family of Trojans arrive as downloaded files from malicious sites. Its main purpose is to download other files on an affected system. The downloaded files are used to either steal
RAMNIT is a multi-component malware that infects .DLL, .EXE, and HTML files. This malware family is known to propagate via removable drives. RAMNIT steals sensitive information such as saved FTP
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder