Keyword: PDF_FAREIT
5498 Total Search   |   Showing Results : 201 - 220
https://iibet.org/biz/eimprovement/index.php --> NOTES: This Trojan shows the following fake message inside the PDF tricking the users to click on the link: PDF/Trojan.GFAV-7 (Cyren) Dropped by other malware, Downloaded from the Internet,
for PDF files which show fake messages when opened. The files require the user to click the image in the PDF file. Once clicked, it will access a URL.
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
following link: https://{BLOCKED}adecv.com/activate/ad/index.php However, as of this writing, the said sites are inaccessible. NOTES: This malware shows the following fake message inside the PDF tricking the
file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. NOTES: This is the Trend Micro detection for PDF files that open a website in a browser when a
connects to the following possibly malicious URL: http://{BLOCKED}dsmartwatchchargingstands.com/good/great/secure.php?whipp=brickz This is the Trend Micro detection for: PDF files that contains a link to a
CVE-2008-4813 Adobe Reader and Acrobat 8.1.2 and earlier, and before 7.1.1, allow remote attackers to execute arbitrary code via a crafted PDF document that (1) performs unspecified actions on a
or cause a denial of service (application crash) via a PDF document with a long field in a Smart INdependent Glyphlets (SING) table in a TTF font, as exploited in the wild in September 2010. NOTE: some
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. Arrival Details This Trojan arrives as an attachment to email messages spammed by other
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. Arrival Details This Trojan arrives as an attachment to email messages spammed by other
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. However, as of this writing, the said sites are inaccessible. Arrival Details This Trojan
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
}sparks.ph/images/bitspace_logo/logosncircles/logocircle.php http://{blocked}cechk.ru/secure.login/waw/mbna/ It does the following: When users click the link on the PDF file, it accesses the said URL which is a phishing site, asking to fill out data to be
This Trojan arrives as attachment to mass-mailed email messages. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.