Keyword: PDF_FAREIT
5498 Total Search   |   Showing Results : 101 - 120
recently surfaced at around the same time HYDRAQ was discovered. The widespread use of Adobe software, particularly Adobe PDF Reader, has led to increased concern. The attack leverages the CVE-2009-4324
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
\icq\shared folder\PDF password remover (works with all acrobat reader).exe %Program Files%\icq\shared folder\Microsoft.Windows 7 Beta1 Build 7000 x86.exe %Program Files%\icq\shared folder\Windows2008
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
\Preferences.lnk %All Users Profile%\Start Menu\Programs\PDFCreator\Readme.lnk %All Users Profile%\Start Menu\Programs\PDFCreator\Uninstall PDF Creator.lnk %All Users Profile%\Start Menu\Programs\VideoConverter
This is the Trend Micro detection for PDF files which shows fake messages when opened. It requires user to click the image in the PDF file. Once clicked, it accesses a URL. This Trojan arrives as an
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
http://supe{BLOCKED}ma.com/dbcrypts/dbcrypts/dbdrives/index.htm However, as of this writing, the said sites are inaccessible. NOTES: This is the Trend Micro detection for PDF files which shows fake messages
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It accesses websites to download files. This action
UPATRE was first spotted in August 2013, after the fall of Blackhole Exploit Kit. Its variants usually arrive onto systems as malicious files attached to spammed messages, or as a link to a malicious
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It sends the information it gathers to remote sites.
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. Arrival Details This Trojan arrives as an attachment to email messages spammed by other
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. Arrival Details This Trojan arrives as an attachment to email messages spammed by other
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a