Search
Keyword: HTML_IESLICE
TrendLabs received spammed messages that use the names of high-profile personalities such as Helena Wong (seen above), Susan Canon, and Conan Boyle, among others, to trick users into opening an .HTML
HTML_IFRAME.JAD inserts an IFRAME tag that redirects users to this URL.
This Trojan takes advantage of the following software vulnerabilities to drop malicious files: Certain versions of Adobe Acrobat and Reader util.printd and Collab.CollectEmailInfo functions This
This Trojan may be hosted on a website and run when a user accesses the said website. Once a user visits an affected Web page, this HTML script launches a hidden IFRAME that connects to a malicious
HTML script launches a hidden IFRAME that connects to a malicious URL. Arrival Details This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan executes when a user accesses certain websites where it is hosted. Arrival Details This Trojan executes when a user accesses certain websites where it is hosted. It may be downloaded from
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain URLs. It may do this to remotely
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be downloaded by other malware/grayware/spyware from remote sites. It may be
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It steals sensitive information such as user names and
This Trojan may be hosted on a website and run when a user accesses the said website. Once a user visits an affected Web page, this HTML script launches a hidden IFRAME that connects to a malicious
This is the Trend Micro detection for Web pages that were compromised through the insertion of a certain malicious script. Once a user visits an affected Web page, this HTML script launches a hidden
is a HTML file that is compromised by a malicious JavaScript code. Once a user visits an affected web page, this HTML script launches a hidden iframe that redirects users to the following website:
This worm arrives by connecting affected removable drives to a system. It may be downloaded by other malware/grayware from remote sites. It is injected into all running processes to remain memory
This worm arrives by connecting affected removable drives to a system. It may be downloaded by other malware/grayware from remote sites. It is injected into all running processes to remain memory
This worm arrives by connecting affected removable drives to a system. It may be downloaded by other malware/grayware from remote sites. It is injected into all running processes to remain memory
This cracking application may be manually installed by a user. Arrival Details This cracking application may be manually installed by a user. Installation This cracking application drops the
This is Trend Micro's detection for malicious HTML files that contain a script that may redirect to another URL to download and execute another JavaScript. This Trojan may be hosted on a website and
This is the Trend Micro detection for Web pages that were compromised through the insertion of a certain malicious script. Once a user visits an affected Web page, this HTML script launches a hidden