Keyword: HTML_IFRAME
5846 Total Search   |   Showing Results : 421 - 440
variant injects malicious iframe code to infect script files. When executed, VIRUX accesses IRC servers to receive malicious commands and download URLs. The said URLs lead to other malware including FAKEAV
This description is based on compiled analysis of several variants of JS_BLACOLE This is the Trend Micro detection for malicious scripts that redirects users to possibly malicious URL(s). This Trojan
downloaded files. As a result, malicious routines of the downloaded files are exhibited on the affected system. NOTES: This Trojan is loaded in an IFRAME by the malware JS_OBFUSC.CU.
This Trojan may be hosted on a website and run when a user accesses the said website. However, as of this writing, the said sites are inaccessible. Arrival Details This Trojan may be hosted on a
variant injects malicious iframe code to infect script files. When executed, VIRUX accesses IRC servers to receive malicious commands and download URLs. The said URLs lead to other malware including FAKEAV
loaded. It adds an iframe with the following URL to vulnerable browsers when a vulnerable PDF plugin is detected: http://{BLOCKED}.{BLOCKED
variant injects malicious iframe code to infect script files. When executed, VIRUX accesses IRC servers to receive malicious commands and download URLs. The said URLs lead to other malware including FAKEAV
OTLARD variants, also known as GOOTKIT, are used primarily to compromise websites with malicious iframe code. OTLARD performs the aforementioned routine by downloading command modules that contain
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
}gidiopinione.com/scommessa NOTES: This JavaScript (JS) file contains an iframe tag that redirects users to the following Web page: http://{BLOCKED}gidiopinione.com/scommessa/cippattina20.php The said page displays the
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be unknowingly downloaded by a user while visiting malicious websites. Arrival
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be unknowingly downloaded by a user while visiting malicious websites. Arrival
This Trojan accesses websites to download files. This action allows this malware to possibly add other malware on the affected computer. It executes the downloaded files. As a result, malicious
Other Details Based on analysis of the codes, it has the following capabilities: It contains an iframe tag that points to the following URL: http://{BLOCKED}.com/10/umi.php - also detected as
This Trojan may be downloaded from remote sites by other malware. Arrival Details This Trojan may be downloaded from remote site(s) by the following malware: JS_IFRAME.AAA Download Routine This
website Download and execute file(s) Insert iframe codes to websites It connects to the following websites to send and receive information: {BLOCKED}.{BLOCKED}.229.140 {BLOCKED}n.cc {BLOCKED}0.org {BLOCKED
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies Internet Explorer security settings. This
This Trojan may be hosted on a website and run when a user accesses the said website. This is the Trend Micro detection for Web pages that were compromised through the insertion of a certain IFRAME
OTLARD variants, also known as GOOTKIT, are used primarily to compromise websites with malicious iframe code. OTLARD performs the aforementioned routine by downloading command modules that contain
OTLARD variants, also known as GOOTKIT, are used primarily to compromise websites with malicious iframe code. OTLARD performs the aforementioned routine by downloading command modules that contain