Skip to content

554 results in Threat Encyclopedia: “TROJ_PIDIEF”
Showing Results : 1 - 10
      NextNext Page
Alias:No Alias FoundDescription:This Trojan may be downloaded from remote sites by other malware. It may be dropped by other malware. It may be downloaded unknowingly by a user when visiting malicious Web sites. This specially-crafted .
It takes advantage of software vulnerabilities in certain software to drop malicious files.This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users.
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. It arrives as an attachment to email messages spammed by other malware/grayware/spyware or malicious users.It executes the dropped file(s).
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users.It takes advantage of software vulnerabilities in certain software to drop malicious files.
Alias:No Alias FoundDescription:This Trojan arrives as attachment to email messages spammed by another malware or a malicious user. It may be dropped by other malware. It may be downloaded unknowingly by a user when visiting malicious Web sites. It is a specially-crafted .
Alias:Mal/JSShell-B (Sophos),Description:This Trojan arrives as attachment to email messages spammed by another malware or a malicious user. It may be downloaded from remote sites by other malware. It is a specially crafted PDF file that exploits a known vulnerability in Acrobat Reader 8.1.
It then executes the downloaded files. Trend Micro detecs the downloaded files as TROJ_AGENT.MIKE. As a result, malicious routines of the downloaded files are exhibited on the affected system.
Alias:No Alias FoundDescription:This Trojan may be downloaded from remote sites by other malware. It may be dropped by other malware. It may be downloaded unknowingly by a user when visiting malicious Web sites. It is a specially crafted .
Alias:No Alias FoundDescription:This Trojan may be downloaded from remote sites by other malware. It may be downloaded unknowingly by a user when visiting malicious Web sites.
Trend Micro has flagged this malware as noteworthy due to the increased potential for damage, propagation, or both, that it possesses. Specifically, it exploits an unknown vulnerability in Adobe Reader and Acrobat to drop another malicious file.

Connect with us on