EFTA00162778Set 9
2018-01-2311p5,469w
campaigns for years, being one of its primary activities, besides spreading the Dridex banking
trojan, and several ransomware families.
• The cryptocurrency in question is Swisscoin, an altcoin that's been ... Hollywood-style Mobile Spy
https://www.kaspersky.com/blog/skygofree-smart-trojan/20717/
• We recently discovered one such cinematic Trojan by the name of Skygofree. Skygofree is overflowing
with functions, some of which we haven ... improve mobile Internet speed. If a user swallows the bait and downloads the Trojan, it displays
a notification that setup is supposedly in progress, conceals itself from the user
https://www.justice.gov/epstein/files/DataSet%209/EFTA00162778.pdf
EFTA00772111Set 9
2009-10-266p1,902w
believes that this E-mail and any
attachments were free of any virus. womb. Trojan horse, andior malicious code when sent. This message and its attachments could have been infected ... believes that this E-mail and any
attachments were free of any virus. wonn. Trojan horse, andor malicious code when sent This message and its attachments could have been infected ... believes that this E-mail and any
attachments were fuze of any virus. worm. Trojan horse, andfor malicious code when sent. This message and its attachments could have been infected
https://www.justice.gov/epstein/files/DataSet%209/EFTA00772111.pdf
EFTA01074050Set 9
19p8,931w
Latin America).
The most prevalent category of mobile threats is that of SMS trojans, which send unauthorized text
messages to short, premium-rate numbers. Other threats include information theft (spyware ... transformation of machines into zombies (botnet recruitment). Many trojans target internet users attempting
to download software for their mobile devices from dubious sites. Often, cybercriminals use these websites
to spread ... malware under the guise of useful software. "Adware" trojans are used by the developers of free
software to monetize products by displaying ads. Cyber criminals are able to disguise malicious
https://www.justice.gov/epstein/files/DataSet%209/EFTA01074050.pdf
EFTA01819560Set 10
2009-10-266p1,698w
believes that this 1:-mail and any attachments were free of any sins. worm. Trojan hone. and or
maliciou, code when sent. This message and its attachments could have been ... sender believes that this li.mail and any attachments wen: free of any 'inn, worm, Trojan hone. Anita
malicious code when sem. this message and its attachments could have been infected ... believes that this F-mail and any attachments were free of any virtu, worm, Trojan hone, andor
malicious code when sent. This message and its attachments could have bans infected
https://www.justice.gov/epstein/files/DataSet%2010/EFTA01819560.pdf
EFTA01177050Set 9
2014-04-233p527w
WARNING RE VIRUSES: Our computer systems
are regularly scanned for computer viruses, worms and Trojan horses, but no warranty is given that this email or its
attachments are free ... such software. Before opening or using attachments, please check for viruses, worms, and
Trojan horses. Our liability is limited to the re-supply of any affected attachments. Any views expressed ... WARNING RE VIRUSES: Our computer systems
are regularly scanned for computer viruses, worms and Trojan horses, but no warranty is given that this email or its
attachments are free
https://www.justice.gov/epstein/files/DataSet%209/EFTA01177050.pdf
EFTA02438870Set 11
2009-10-266p1,562w
that this (;•mail and any :Macho's-Ms were free of any virus. worm, Trojan horsy. anchor malicious code
what sent. This message and its 3iI3CIIITICrItt could have been infected ... sender believes that this Tzmail and any attachments one free of any sins. worm, Trojan horse. and••or malicious code
when sent. This message and its attachments could have been ... sender believes that this Email and any attachments were
free of any virus, worm. Trojan horse. and/or malicious code when sent. This message and its attachments could have been infected
https://www.justice.gov/epstein/files/DataSet%2011/EFTA02438870.pdf
EFTA01195832Set 9
2014-04-0638p19,718w
back, Greeks launched 1,000 warships.
According to Greek mythology, the Trojan War followed. Homer's Odyssey and Iliad recounted it.
So did Roman poets Virgil and Ovid. Homer said ... drugs" fear tactics. Near its end,
Greeks entered Troy in a Trojan Horse. America's perhaps was 9/11. Both were duplicitous acts used
to ravage targeted enemies.
The expression, "beware ... back then. According to Homer and
other Greek literature, they burned the city, captured Trojan women, rescued Helen, and returned her
to Menelaus, her husband. Fear, misinformation, and deceit work
https://www.justice.gov/epstein/files/DataSet%209/EFTA01195832.pdf
EFTA00326138Set 9
2016-04-273p932w
believes that this E-mail and any attachments were free of any virus, worm. Trojan horse, and/or malicious code when sent. This message and its attachments
could have been infected ... sender believes that this E-mail and any attachments were free Many virus, worm. Trojan horse. andfor malicious code when sent. This message and its attachments could
have been infected ... sender believes that this E-mail and any attachments were free ofany virus. wont,. Trojan home. and'or malicious code when sent. This message and its attachments could have been
https://www.justice.gov/epstein/files/DataSet%209/EFTA00326138.pdf
EFTA00770915Set 9
2009-10-013p445w
believes that this E-mail and
any attachments were free of any virus, worm, Trojan horse, and/or malicious code when sent. This message
and its attachments could have been infected ... believes that this E-mail and any attachments were free of any virus. worm. Trojan horse, and/or malicious code when sent. This message and its
attachments could have been infected
https://www.justice.gov/epstein/files/DataSet%209/EFTA00770915.pdf