Trojan.HTML.Phishing

Classification

Category :

Malware

Type :

Trojan

Aliases :

Trojan.html.phishing.[variant]

Summary

Trojan.HTML.Phishing is a malicious program that silently redirects the web browser to a fraudulent web page or site.

Removal

Based on the settings of your F-Secure security product, it will either move the file to the quarantine where it cannot spread or cause harm, or remove it.

A False Positive is when a file is incorrectly detected as harmful, usually because its code or behavior resembles known harmful programs. A False Positive will usually be fixed in a subsequent database update without any action needed on your part. If you wish, you may also:

  • Check for the latest database updates

    First check if your F-Secure security program is using the latest updates, then try scanning the file again.

  • Submit a sample

    After checking, if you still believe the file is incorrectly detected, you can submit a sample of it for re-analysis.

    Note: If the file was moved to quarantine, you need to collect the file from quarantine before you can submit it.

  • Exclude a file from further scanning

    If you are certain that the file is safe and want to continue using it, you can exclude it from further scanning by the F-Secure security product.

    Note: You need administrative rights to change the settings.

Technical Details

As its name suggests, malware identified as Trojan.HTML.Phishing.[variant] will try to perform a phishing attack, which involves luring the user into giving away their personal or financial details by impersonating a legitimate entity.

Phishing attacks typically involve communications (either email messages or a web page or site) that are specially crafted to look similar or even identical to the correspondence or portal of a legitimate company, so that the user is deceived into trusting it.

Fraudulent web pages or sites often provide a form, where the user is lured to submit their login, personal or financial details. Any information unwittingly submitted by the user through it is compromised.