Keyword: W2KM_DOXMAL
47036 Total Search   |   Showing Results : 981 - 1000
A recent spam outbreak we have observed involved email disguised as an invoice for a certain purchase order and pretends to be coming from legitimate companies such as Telstra or Cathay Pacific .
Sometimes, a colleague sends you a file to print for him or her, especially if he or she can't properly connect to the office printer. This spammed message plays upon that possibility. It poses as a
We have observed a spam outbreak where email messages pose as a simple billing email. It uses Bill in its subject, along with random numbers and a document file as an attachment. There are no
We recently received samples of a malicious spam campaign that uses a malicious PDF attachment as its malware infection vector. The mail itself has no body content and appears to be sent from a
Trojan Powmet are arriving as attachments to invoice and efax-related emails. In spoofed invoice mails, .xls attachments were used while spoofed efax email used .doc attachments. Upon investigation,
Similar to EMOTET’s arrival, Trojan spyware Azurolt has been spotted coming in the form of a spoofed bank notification. The spam campaign is making the rounds in Germany and UK. The email prompts the
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives as an attachment to email messages mass-mailed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan arrives as an attachment to email messages mass-mailed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be dropped by other malware. Arrival Details This
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the dropped file(s). As a result, malicious routines of the dropped files are
This Trojan arrives as an attachment to email messages mass-mailed by other malware/grayware or malicious users. Arrival Details This Trojan arrives as an attachment to email messages mass-mailed by
This Trojan arrives as an attachment to email messages mass-mailed by other malware/grayware or malicious users. Arrival Details This Trojan arrives as an attachment to email messages mass-mailed by
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This backdoor may be downloaded by other malware/grayware from remote sites. It executes commands from a remote malicious user, effectively compromising the affected system. Arrival Details This
This backdoor may arrive using one or multiple arrival methods. It executes commands from a remote malicious user, effectively compromising the affected system. It connects to a website to send and
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This spyware may be downloaded by other malware/grayware from remote sites. It modifies the Internet Explorer Zone Settings. It connects to certain websites to send and receive information. It
This spyware may be downloaded from remote sites by other malware. It does not have any propagation routine. However, as of this writing, the said sites are inaccessible. Arrival Details This spyware
This spyware may be downloaded by other malware/grayware from remote sites. It may be dropped by other malware. It connects to certain websites to send and receive information. It deletes itself