Keyword: JS_INJECT
7764 Total Search   |   Showing Results : 3841 - 3860
taking, and HTML injections or the ability to ‘inject’ malicious code into certain websites that the affected user is currently viewing. Instead of a login page sending the entered credentials to the
Craigslist has become one of the more popular sites to advertise nearly every service or product. Trend Micro researchers recently received messages which use Craigslist to distribute spammed
TROJ_SASFIS.HQ accesses this URL to download TROJ_INJECT.SMD.
TROJ_SASFIS.HQ accesses this URL to download TROJ_INJECT.QWZQ.
TROJ_INJECT.SMD connects to this URL to download and execute a malicious file.
This URL is related to BKDR_INJECT.AIB.
TROJ_INJECT.SMD connects to this URL to download and execute a malicious file.
TROJ_INJECT.G connects to this IP site.
This is the site where BKDR_INJECT.EVL connects to send and receive information. This backdoor malware was used in a targeted attack campaign which exploited an Adobe Flash Player vulnerability.
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This file infector arrives on a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies files, disabling programs and applications
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes then deletes itself afterward. It connects
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
Delete, search, and upload files Download and inject remote codes to legitimate processes Log keystrokes and active window Manage processes and services Modify and search the registry entries Perform a
Modify and search the registry entries Manage processes and services View and terminate active windows and ports Perform a shell command Download and inject remote codes to legitimate processes Log
Manage processes and services View and terminate active windows and ports Perform a shell command Download and inject remote codes to legitimate processes Log keystrokes and active windows Capture
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the dropped file(s). As a result, malicious routines of the dropped files are
This backdoor may be dropped by other malware. It executes commands from a remote malicious user, effectively compromising the affected system. It connects to a website to send and receive