Keyword: PDF_FAREIT
5498 Total Search   |   Showing Results : 121 - 140
We have observed a recent spike in spam in Russian language. The spammed message delivers a SHADE ransomware variant via embedded link in the attached .PDF. Upon investigation, this campaign used
Trend Micro has received multiple samples of this worm from multiple, independent sources, including customer reports and internal sources. These indicate that this worm poses a high risk to users
This malware is involved in certain targeted attacks that took place on March 2013. It drops and opens non-malicious document files to hide its backdoor routines. Users affected by this malware may
are exhibited on the affected system. NOTES: It takes advantage of a zero-day vulnerability in the following software to drop malicious files: Adobe PDF Reader 9 Adobe PDF Reader 10 Adobe PDF Reader 11
This is a specially crafted PDF which takes advantage of a recent vulnerability in Adobe (CVE-2013-0641) to drop MiniDuke malware. To get a one-glance comprehensive view of the behavior of this
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
This Trojan opens non-malicious .PDF files for users not to suspect any malicious activity in the system. This Trojan arrives as an attachment to email messages spammed by other malware/grayware or
' JavaScript Method Remote Code Execution Vulnerability Adobe Acrobat and Reader Collab 'getIcon()' JavaScript Method Remote Code Execution Vulnerability Adobe Multiple Products PDF JavaScript Method Buffer
Trend Micro has received multiple samples of this worm from multiple, independent sources, including customer reports and internal sources. These indicate that this worm poses a high risk to users
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the downloaded files. As a result, malicious
Trend Micro detection for: PDF files that presents the user a fake message tricking them to click embedded link. NOTES: Upon execution of the file, the user is presented with a fake message (see below)
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. Arrival Details This Trojan arrives as an attachment to email messages spammed by other
malware/grayware or malicious users. NOTES: This is the Trend Micro detection for PDF files that contains a malicious link. Once the link on the document file is opened, a browser will be opened and redirected to
), Windows Server 2008, and Windows Server 2012.) Other Details This Trojan does the following: It deletes the created folder and drop file once PDF file has been closed. Trojan.PDF.Agent.CW
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. Arrival Details This Trojan arrives as an attachment to email messages spammed by other
}gingayam.co.id/wp-admin/vmsi/index.html It does the following: When users click the link on the PDF file, it accesses the said URL which is a phishing site. This routine risks the exposure of the user's account information, which may then
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Backdoor arrives on a system as a