Search
Keyword: JS_EXPLOIT
capabilities. It does not exploit any vulnerability. Trojan:JS/Iframe.BU (Microsoft), JS/Exploit-Blacole.eu (McAfee), Troj/Iframe-IO (Sophos), JS/Redirector.AF (Panda) Connects to URLs/IPs
This Trojan may be hosted on a website and run when a user accesses the said website. This is the Trend Micro detection for files that contain a malicious script. It redirects browsers to certain
have rootkit capabilities. It does not exploit any vulnerability. Trojan:JS/BlacoleRef.DH (Microsoft), JS/Exploit-Blacole.ht (McAfee), JS/Kryptik.AKI trojan (NOD32) Connects to URLs/IPs
This Trojan accesses a certain URL to download a JAR file. It then executes the file Inc.class inside the JAR file. The file Inc.class is detected by Trend Micro as JAVA_BLACOLE.BM. This Trojan may
This Trojan executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the affected system. Arrival Details This Trojan may be downloaded from the
This Trojan may be hosted on a website and run when a user accesses the said website. This is the Trend Micro detection for files that contain a malicious script. It redirects browsers to certain
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. However, as of this writing, the said sites are
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It does not have any propagation routine. It does not have any backdoor routine. It
This Trojan may be hosted on a website and run when a user accesses the said website. This is the Trend Micro detection for files that contain a malicious script. It requires its main component to
This Trojan may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may be hosted on a website and run when a user accesses the said website. NOTES: This
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan may be downloaded from remote sites by other malware. It executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the affected system. It
This Trojan may be hosted on a website and run when a user accesses the said website. It takes advantage of software vulnerabilities to allow a remote user or malware/grayware to download files. As
this writing, the said sites are inaccessible. NOTES: It does not have rootkit capabilities. It does not exploit any vulnerability. Trojan:JS/IframeRef.I (Microsoft), JS/Exploit-Blacole.gg !! (McAfee)
This Trojan may be hosted on a website and run when a user accesses the said website. This is the Trend Micro detection for files that contain a malicious script. Arrival Details This Trojan may be
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be hosted on a website and run when a user accesses the said website. It inserts an
This malware exploits a vulnerability in CVE-2012-1875, which is addressed in MS12-037 bulletin. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram
This is the Trend Micro detection for malware that redirect browsers to potentially malicious websites. This Trojan redirects browsers to certain sites. Arrival Details This Trojan may be downloaded
This Trojan may be hosted on a website and run when a user accesses the said website. However, as of this writing, the said sites are inaccessible. Arrival Details This Trojan may be hosted on a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user