Keyword: JS_PETCH
4697 Total Search   |   Showing Results : 3121 - 3140
JS_REDIR.SMAL connects to this malicious URL.
JS_REDIR.SMAL connects to this malicious URL.
JS_AGENTT.KEN connects to this malicious URL.
JS_IFRAME.AVX inserts an IFRAME tag that redirects users to this URL.
TSPY_ZBOT.TEW connects to this URL(s) to download its configuration file.
JS_QBOT.AB connects to this URL.
JS_QBOT.AB connects to this URL.
JS_QBOT.AB connects to this URL.
JS_QBOT.AB connects to this URL.
JS_QBOT.AB connects to this URL.
JS_QBOT.AB connects to this URL.
This URL is related to JS_IFRAME.OYA.
This URL is used in a phishing attack that specifically targets clients of Khaleeji Commerical Bank. The phishing email informs clients that they need to log into their online account to activate and
JS_SHELLCOD.SMGU accesses this URL to download TROJ_LAMECHI.D.
JS_SHELLCOD.SMGU may be downloaded from this URL.
JS_SHELLCOD.SMGU accesses this URL to download TROJ_DLOADR.DAM.
JS_SHELLCOD.SMGU accesses this URL to download PE_PARITE.A.
JS_SHELLCOD.SMGU accesses this URL to download TROJ_GAMETHI.FMS.
JS_SHELLCOD.SMGU accesses this URL to download TSPY_ARDAMAX.HR.
http://SJC1-TE-CMSAP1.sdi.trendnet.org/dumpImages/271201264332.jpeg Contrary to its name, one-click billing fraud takes more than just one click. Fraudsters trick users into downloading malware