Web Attacks
How does this threat get into users' systems?Users received spammed messages purporting to come from Microsoft, telling them Service Packs 1 and 2 had supposed errors that could damage their system so...
How does this threat get into users' systems?This threat arrives via spammed messages containing a malicious link that led users to a site injected with a malicious VBScript detected by Trend Micro as...
How does this threat get into users' systems?This threat arrives via spammed messages that contain a link that when clicked redirected users to a malicious site.How does this threat affect users?Downl...
How does this threat get into users' systems?Spammed messages claiming to contain photos of Michael Jackson’s funeral arrive in users’ inboxes. Clicking the link in the email messages triggered the do...
How does this threat get into users' systems?Spammed messages trick users into clicking a link where they ended up downloading a Valentine's Day e-card that someone suposedly sent.How does this threat...
How does this threat get into users' systems?Spammed messages lure users into downloading an electronic game related to the 2009 Israeli legislative elections. These email messages contained a link to...
Background of the Attack TSPY_ZBOT is the Trend Micro detection for malware related to what the industry dubs "ZeuS botnets." ZeuS botnet, in fact, is a shortened term for networks of compromised comp...
How does this threat get into users' systems?Users receive Independence Day-themed spammed messages that contain a malicious link. How does this threat affect users?Clicking the link leads users to a ...
How does this threat get into users' systems?Users receive spammed messages containing news on the Israel-Gaza conflict supposedly from CNN. How does this threat affect users?Users who are tricked int...