Keyword: JS_PSYME
4709 Total Search   |   Showing Results : 3121 - 3140
A new wave of spam that uses *.rar *.zip *.gif *.tiff *.docx *.pdf *.jpg is making its rounds. The attachment looks like it is renamed to lure recipients into clicking the attachment files. These
A JavaScript malware is seen in a spam outbreak involving a spammed message pretending to be an invoice notification email with suspicious ZIP attachments. As per the usual route of spam, the body of
Trend Micro engineers came across spam mail which appear to be non-delivery reports or undelivered mail notice from mx.google.com . Upon further investigation, these messages are verified to be
A spam message purporting to be a requested letter is making its rounds, carrying an attachment that is a JavaScript malware. When users open this attachment, their computers are infected with
We have observed a recent spike in spam in Russian language. The spammed message delivers a SHADE ransomware variant via embedded link in the attached .PDF. Upon investigation, this campaign used
The malware related to this URL connects to this URL to download a malicious file. <SPAN style="FONT-FAMILY: 'Times New Roman','serif'; FONT-SIZE: 12pt; mso-fareast-font-family: 'Times New Roman';
This malicious URL downloads a file detected as TR
This malicious URL hosts a malicious script. Said malicious script is detected asJS_IFRAME.AUW.
JS_REDIR.BOG redirects to this URL
JS_REDIRECTOR.FX redirects users to this URL.
JS_REDIR.FU redirects users to this URL.
JS_REDIR.SMAL connects to this malicious URL.
JS_REDIR.SMAL connects to this malicious URL.
JS_REDIR.SMAL connects to this malicious URL.
JS_REDIR.SMAL connects to this malicious URL.
JS_AGENTT.KEN connects to this malicious URL.
JS_IFRAME.AVX inserts an IFRAME tag that redirects users to this URL.
TSPY_ZBOT.TEW connects to this URL(s) to download its configuration file.
JS_QBOT.AB connects to this URL.