Search
Keyword: url
            This adware  arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It downloads a file from a certain URL then renames it before storing it in the affected system. It execut...
 This Trojan Spy  arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It...
 This threat is related to attacks that used Android Same Origin Policy (SOP) vulnerability to target Facebook users. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below. This Trojan  takes ad...
 
Cross-site scripting (XSS) vulnerability in the URLDecoder function in JRE before 1.8, as used in Apache Struts 2.x before 2.3.28, when using a single byte pa...
 SYSIE or also known as Rabasheeta is a Trojan which opens a backdoor on a compromised computer. This malware drops a main module and a configuration file. The configuration file of SYSIE contains the board category, BBS ID, and the URL where this mal...
 Spammers take advantage of the news regarding the supposedly merging of Skype, Hotmail, and MSN to lure users into downloading this malware. The spammed message includes a URL that points to this malware posing as an authorized certificate. To get a ...
 This Trojan  arrives as a component bundled with malware/grayware packages. It executes when a user accesses certain websites where it is hosted. It does not have any propagation routine. It does not have any backdoor routine. It does not have any do...
 This Trojan  may arrive bundled with malware packages as a malware component. It may be hosted on a website and run when a user accesses the said website. It does not have any propagation routine. It does not have any backdoor routine. It downloads a...
 This Trojan  may be hosted on a website and run when a user accesses the said website. It does not have any propagation routine. It does not have any backdoor routine. This is the Trend Micro detection for Web pages that were compromised through the ...
 This Ransomware  arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It downloads a file from a certain URL then renames it before storing it in the affected system. It ex...
 This Trojan  may be hosted on a website and run when a user accesses the said website. It does not have any propagation routine. It does not have any backdoor routine. It does not have any information-stealing capability. This is the Trend Micro dete...
 This information stealing malware arrives as spam spoofing an invoice or payment notification. If the user clicks the URL in the email, it executes a PowerShell command that downloads EMOTET. It then gathers information on the affected system and sen...
 The malware may be hosted in a compromised or malicious website. It requires the arguments found in the website's URL in order to proceed with its intended routine. This Exploit  arrives on a system as a file dropped by other malware or as a file dow...
 This Trojan  arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
 This Trojan  arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
 This Trojan  arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
 This Trojan  arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
 This Trojan  arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
 This Trojan  arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
 This Trojan  arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
 