Solutions Available
SOLUTION MODULES | SOLUTION AVAILABLE | PATTERN BRANCH | RELEASE DATE | DETECTION/POLICY/RULES |
---|---|---|---|---|
WEB REPUTATION | Yes | In the Cloud | ||
EMAIL PROTECTION | Yes | AS Pattern 5446 | May 27, 2020 | |
FILE DETECTION (VSAPI/SMART SCAN) | Yes | ENT OPR 15.863.00 | May 11, 2020 | Trojan.XF.FORMULOAD.A Trojan.X97M.FORMULOAD.LJ Trojan.X97M.FORMULOAD.AO Trojan.XF.HIDDBOOK.A |
ADVANCED THREAT SCAN ENGINE (ATSE) | Yes | 15.863.00 | May 11, 2020 |
Defense against Spam
Spam email is one of the vehicles cybercriminals use to spread malicious files. Users can defend against these types of threats with the following best practices:
- Be wary of downloading attachments or clicking links in emails coming from unfamiliar sources. Hover the pointer over a link to check the link’s URL.
- Check the email address of the sender. If it is unfamiliar or is not linked to a reputed organization, it is best not to perform any action related to the email.
- Watch out for grammatical errors and misspellings in the email body. Emails from legitimate companies are usually well-constructed.
- Keep email addresses and other personal information private. This lessens the chances of receiving spam emails.
Security solutions can also help safeguard against spam and other email-based threats:
- Trend Micro Email Security
- Trend Micro Deep Discovery Email Inspector
Threat Reference Information
- Security News: Analysis: Suspicious “Very Hidden” Formula on Excel 4.0 Macro Sheet
- Security News: Excel Files with Hidden Sheets Target Users in Italy
- Threat Encyclopedia: Trojan.X97M.FORMULOAD.AO
- Threat Encyclopedia: Trojan.XF.FORMULOAD.A
- Threat Encyclopedia: Trojan.XF.HIDDBOOK.A
- Threat Encyclopedia: TrojanSpy.Win32.URSNIF.TIABOEFB
- Threat Encyclopedia: TrojanSpy.Win32.URSNIF.TIABOEEX
- Threat Encyclopedia: Trojan.XF.URSNIF.SM