Search
Keyword: JS_EXPLOIT
This spyware may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It creates folders where it drops its files. It modifies the Internet
This Trojan executes when a user accesses certain websites where it is hosted. It inserts an IFRAME tag that redirects users to certain URLs. Arrival Details This Trojan executes when a user accesses
This adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be manually installed by a user. Arrival Details
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
In this blackhole exploit kit spam run, spammers use a legitimate email notification template from FedWire . It lures users into clicking a malicious link. Once the URL is clicked, it redirects to a
Spammers seeking to distribute blackhole exploit kits use of a legitimate email notification purportedly coming from AT&T . The message seeks to lure potential victims to click a malicious link. Once
Spam campaigns using various email notifications purportedly coming from ADP lead to a blackhole exploit kit server. These spammed messages attempts to lure users into clicking a malicious link,
In this blackhole exploit kit spam run, spammers use a legitimate email notification template from Xanga . From the email's content, it lures users into clicking a malicious link. Once the URL is
A spam campaign using Western Union leads to a blackhole exploit kit server. The email notification contains a link to lure users into clicking a link that supposedly redirects the user to a supposed
Blackhole exploit kit makers are now riding on adult-related spammed messages to spread itself. The spammed message is in text format and asks the reader to access photos via a link. Once clicked, it
A notification from file-sharing website Sendspace leads to blackhole exploit kit. The message instructs target users to click on a link to download a file. Users who fall for this trick are
Recently, we've been receiving samples of spam campaigns leveraging the notorious Blackhole Exploit Kit. These spammed messages (which spoof official notifications from organizations such as Facebook
organizations. In a watering hole attack scenario, threat actors compromise a carefully selected website by inserting an exploit resulting in malware infection. Senior threat researcher Nart Villeneuve documented
This Trojan arrives as a component bundled with malware/grayware packages. It may be hosted on a website and run when a user accesses the said website. It requires its main component to successfully
This is the Trend Micro detection for malicious Java Class that attempts to exploit an unknown vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7 and 6 Update 27
This Trojan may arrive bundled with malware packages as a malware component. It exports functions used by other malware. Arrival Details This Trojan may arrive bundled with malware packages as a
that is used to execute an exploit code. Once successful, it may download and execute a possibly malicious file from a certain URL.
This Trojan arrives as a component bundled with malware/grayware packages. It may be hosted on a website and run when a user accesses the said website. It executes the downloaded files. As a result,
This Trojan may arrive bundled with malware packages as a malware component. It may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may arrive