Keyword: JS_EXPLOIT
10410 Total Search   |   Showing Results : 1241 - 1260
Spammers seeking to distribute blackhole exploit kits use of a legitimate email notification purportedly coming from AT&T . The message seeks to lure potential victims to click a malicious link. Once
Spam campaigns using various email notifications purportedly coming from ADP lead to a blackhole exploit kit server. These spammed messages attempts to lure users into clicking a malicious link,
In this blackhole exploit kit spam run, spammers use a legitimate email notification template from Xanga . From the email's content, it lures users into clicking a malicious link. Once the URL is
A spam campaign using Western Union leads to a blackhole exploit kit server. The email notification contains a link to lure users into clicking a link that supposedly redirects the user to a supposed
Blackhole exploit kit makers are now riding on adult-related spammed messages to spread itself. The spammed message is in text format and asks the reader to access photos via a link. Once clicked, it
A notification from file-sharing website Sendspace leads to blackhole exploit kit. The message instructs target users to click on a link to download a file. Users who fall for this trick are
Recently, we've been receiving samples of spam campaigns leveraging the notorious Blackhole Exploit Kit. These spammed messages (which spoof official notifications from organizations such as Facebook
organizations. In a watering hole attack scenario, threat actors compromise a carefully selected website by inserting an exploit resulting in malware infection. Senior threat researcher Nart Villeneuve documented
This Trojan arrives as a component bundled with malware/grayware packages. It may be hosted on a website and run when a user accesses the said website. It requires its main component to successfully
This is the Trend Micro detection for malicious Java Class that attempts to exploit an unknown vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7 and 6 Update 27
This Trojan may arrive bundled with malware packages as a malware component. It exports functions used by other malware. Arrival Details This Trojan may arrive bundled with malware packages as a
that is used to execute an exploit code. Once successful, it may download and execute a possibly malicious file from a certain URL.
This Trojan arrives as a component bundled with malware/grayware packages. It may be hosted on a website and run when a user accesses the said website. It executes the downloaded files. As a result,
This Trojan may arrive bundled with malware packages as a malware component. It may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may arrive
This is used as a component of other malware. It exploits a vulnerability in several versions of Oracle Java Runtime Environment (JRE) component. It allows this Trojan to execute arbitrary codes on
Settings\{user name}\Local Settings\Temp on Windows 2000, XP, and Server 2003.) NOTES: This is a Java class file that is used to execute an exploit code. Once successful, it may download a possibly malicious
This malicious HTML file exploits a zero-day vulnerability in Internet Explorer 7, 8, and 9. The exploit leads to the dropping of a PoisonIvy backdoor. PoisonIvy backdoors are known to be widely used
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This is used as a component of other malware. It exploits a vulnerability in several versions of Oracle Java Runtime Environment (JRE) component. It allows this Trojan to execute arbitrary codes on
This Trojan executes when a user accesses certain websites where it is hosted. It executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the affected