Keyword: JS_EXPLOIT
10460 Total Search   |   Showing Results : 2701 - 2720
Internet by attempting to send the exploit code to random Internet addresses. It generates a set of URLs containing 250 random sites per day based on the UTC time standard. It blocks access to websites that
This Trojan may be hosted on a website and run when a user accesses the said website. It requires its main component to successfully perform its intended routine. Arrival Details This Trojan may be
This malware was involved in the Adobe Flash Player zero-day exploit incident reported on February 2014. It would automatically download onto users' systems once the user browsed a compromised
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan may arrive bundled with malware packages as a malware component. It may be hosted on a website and run when a user accesses the said website. It requires its main component to
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It takes advantage of certain vulnerabilities. Arrival
This Trojan requires its main component to successfully perform its intended routine. Arrival Details This malware arrives via the following means: hosted in a compromised or malicious site Other
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the dropped file(s). As a result, malicious routines of the dropped files are
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It takes advantage of certain vulnerabilities. Arrival
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user
This Trojan may be hosted on a website and run when a user accesses the said website. It requires its main component to successfully perform its intended routine. Arrival Details This Trojan may be
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user
link, also in spammed email. Others are delivered by exploit kits. Some others are delivered via malvertisements or compromised websites. To prevent ransomware, users should use protection that also
This Trojan may be hosted on a website and run when a user accesses the said website. It requires its main component to successfully perform its intended routine. Arrival Details This Trojan may be
HEUR:Exploit.SWF.Agent.gen (Kaspersky) New Flash Vulnerability CVE-2016-4117 Shares Similarities With Older Pawn Storm Exploit Spammed via email Connects to URLs/IPs
exploit kit Propagation This Trojan does not have any propagation routine. Backdoor Routine This Trojan does not have any backdoor routine. Other Details This Trojan requires its main component to
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. As of this writing, the said sites are inaccessible. Arrival Details This Trojan arrives
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It takes advantage of software vulnerabilities in certain software to drop malicious
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes when a user accesses certain websites where