Keyword: JS_EXPLOIT
10410 Total Search   |   Showing Results : 1681 - 1700
This Trojan arrives as a component bundled with malware/grayware packages. It may be hosted on a website and run when a user accesses the said website. It requires its main component to successfully
This Trojan arrives as a component bundled with malware/grayware packages. It may be hosted on a website and run when a user accesses the said website. It executes the downloaded files. As a result,
This Trojan may be hosted on a website and run when a user accesses the said website. It executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the
is a Java class file that is used to execute an exploit code. Once successful, it may download and execute a possibly malicious file from a certain URL. The URL where this malware downloads the said
This Trojan may be hosted on a website and run when a user accesses the said website. It executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the
passed on to it by its components: DDhLGRq TpCeVSiSIL RWkVj NOTES: This is the Trend Micro detection for malicious Java Class that attempts to exploit a vulnerability in the Java Runtime Environment
This malware was involved in the Red October campaign, a series of attacks targeting diplomatic and government agencies. It drops malicious files onto the affected system and executes them, causing
This Trojan may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may be hosted on a website and run when a user accesses the said website. Download
This Trojan may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may be hosted on a website and run when a user accesses the said website. Download
This Trojan arrives as a component bundled with malware/grayware packages. It may be hosted on a website and run when a user accesses the said website. It executes the downloaded files. As a result,
This Trojan arrives as a component bundled with malware/grayware packages. It may be hosted on a website and run when a user accesses the said website. It executes the downloaded files. As a result,
This Trojan may arrive bundled with malware packages as a malware component. It may be hosted on a website and run when a user accesses the said website. It executes the downloaded files. As a
This malware exploits vulnerabilities related to CVE-2013-0431. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below. This Trojan may arrive
This Trojan contains an embedded malicious .SWF file that it uses to successfully exploit the specific vulnerability. The malicious .SWF file is detected by Trend Micro as SWF_EXPLOIT.WMP. It
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan is a Java component of the black hole exploit kit . This Trojan executes when a user accesses certain websites where it is hosted. It executes the downloaded files. As a result, malicious
This Trojan arrives as a component bundled with malware/grayware packages. It may be hosted on a website and run when a user accesses the said website. However, as of this writing, the said sites are
This Trojan may arrive bundled with malware packages as a malware component. It may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may arrive
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It arrives as a component bundled with malware/grayware
This Trojan may arrive bundled with malware packages as a malware component. It executes when a user accesses certain websites where it is hosted. Arrival Details This Trojan may arrive bundled with