Posted: May 28, 2012 | Category: Trojans | Threat Level: 8/10
TrojanDownloader:Win32/Adload.DA is a Trojan downloader that downloads and installs other files, including PC threats, without your permission. The C&C site that TrojanDownloader:Win32/Adload.DA uses to conduct these activities has been blacklisted for various types of malicious behavior, and its Korean domain is indicative of TrojanDownloader:Win32/Adload.DA potentially being a significant threat to Korea-based PCs in particular. Symptoms of TrojanDownloader:Win32/Adload.DA's attacks may vary with the files that TrojanDownloader:Win32/Adload.DA downloads but often include blocked security...


Posted: May 28, 2012 | Category: Viruses | Threat Level: 8/10
Win64/Obfuscation.A is a virus that creates copies of itself. Win64/Obfuscation.A is difficult to detect, especially all of its copies at once. Win64/Obfuscation.A is known to have a few reserve copies of its files disguised in the PC while the active file immediately creates a process that activates subsequent copies. This allows Win64/Obfuscation.A to proliferate in the infected computer and execute its payload, even if portions of Win64/Obfuscation.A have been removed by the PC user. Win64/Obfuscation.A is associated with TDSS rootkit , which causes annoying browser redirects to...

Montiera Toolbar

Posted: May 28, 2012 | Category: Bad Toolbars | Threat Level: 5/10
Montiera Toolbar is a potentially unwanted application, which may enter the computer without the PC user's approval. Montiera Toolbar may set its own start page and default search engine on the computer system and show constant pop-up ads during online search sessions. In actuality, Montiera Toolbar's activity may possibly be done for the commercial aim only because PC users may always be made by Montiera Toolbar to visit unreliable websites that may pay for its creators for raising their traffic. If the computer user has been rerouted to such unidentified websites, he should leave it...


Posted: May 25, 2012 | Category: Malware | Threat Level: 7/10
PUP.BundleInstaller.OI is an unwanted application related to the file named 'disk-defrag.ex' and other files that PC users believe to be pretty harmless and, thus, install without precaution. PUP.BundleInstaller.OI may trigger numerous error messages on files missing, invalid Windows installation and similar issues. PUP.BundleInstaller.OI replicates itself to lurk in concealed locations on your computer in encrypted mode. PUP.BundleInstaller.OI can restore its copies even after removal so that it can avoid detection.


Posted: May 25, 2012 | Category: Backdoors | Threat Level: 6/10
Backdoor.win32.zaccess.oun is an advanced kernel mode backdoor Trojan infection. Backdoor.win32.zaccess.oun runs secretly in the system background. Backdoor.win32.zaccess.oun is able to remove programs it recognizes as its potential removal tools. Backdoor.win32.zaccess.oun can delete programs unrelated to anti-virus software. Backdoor.win32.zaccess.oun can also download and install additional malware threats.


Posted: May 24, 2012 | Category: Worms | Threat Level: 5/10
Worm.Nayrabot.gen!A is a worm that affects Windows PCs and can invade the targeted system secretly. Worm.Nayrabot.gen!A can steal personal information without having administrative authorizations. Worm.Nayrabot.gen!A is distributed via encrypted downloads or setups in malicious spam email attachments. Worm.Nayrabot.gen!A might be very difficult to detect and remove from the corrupted PC system, because the Trojan does not have an interface, and is composed of such files, which help disguise its malicious components from extermination. Worm.Nayrabot.gen!A can be covered with the rootkit...


Posted: May 24, 2012 | Category: Trojans | Threat Level: 9/10
Trojan.Exprez is a Trojan that executes harmful actions on the infected computer. Once installed, Trojan.Exprez downloads malicious files. Trojan.Exprez also downloads the certain file shortcut so that it can run automatically every time you start Windows. This file shortcut will run the certain file. Trojan.Exprez stops the 'taskmgr.exe' process. Trojan.Exprez tries to alter .doc files found in the particular folder %CurrentFolder%. Trojan.Exprez tries to connect to the specific domains.


Posted: May 24, 2012 | Category: Trojans | Threat Level: 9/10
Trojan.Spambot.11349 is a Trojan that infects the targeted PC system via security loopholes and unsafe downloads. Trojan.Spambot.11349 can also infect the computer system via malicious spam email attachments and bogus video media codecs. Once installed, Trojan.Spambot.11349 creates the certain files on the PC system. Trojan.Spambot.11349 can also delete particular files on the infected computer. Trojan.Spambot.11349 replaces the HOSTS file. Trojan.Spambot.11349 modifies the Windows registry by changing some registry keys. To avoid firewall, Trojan.Spambot.11349 removes or modifies the...


Posted: May 24, 2012 | Category: Backdoors | Threat Level: 6/10
BackDoor.Andromeda is a backdoor Trojan that was identified by reputable PC security companies in late 2011. As is the case with other backdoor Trojans, BackDoor.Andromeda foremost goal is to infect your PC secretly and drill a vulnerability through its security that permits criminals to take over your PC from a remote server. BackDoor.Andromeda may also be used to install other PC threats such as Trojan.Hosts.5858 , distribute itself via removable media or even steal passwords from FTP programs. As an intricate PC threat that includes traits of worms and spyware along with its backdoor...


Posted: May 24, 2012 | Category: Trojans | Threat Level: 9/10
While most browser hijackers limit themselves to exposing you to unpleasant sites every once in a while and otherwise let you go about your business, Trojan.Hosts.5858 is noteworthy for being a browser hijacker that uses its attacks as a form of ransom. Trojan.Hosts.5858 attempts to block normal web browser usage by redirecting you to a malicious site that hosts a fraudulent warning message. In a ploy that malware experts have found to be more typical for ransomware Trojans than browser hijackers, this message informs victims that their Internet access is being blocked...


Posted: May 23, 2012 | Category: Trojans | Threat Level: 9/10
Trojan-psw.win32launch is a 32-bit systems oriented Trojan; however, it can run, but less effectively, in other operating system environments, as well. The name of Trojan-psw.win32launch is often included into security alerts of rogue anti-spyware applications. For instance, Windows Pro Web Helper adware has been spotted at showing the warning message claiming the computer is about to shutdown because a password stealing malware threat has been detected. The alert message on password retrieving virus is often displayed on the fake pop-up alerts of fraudulent security application named...


Posted: May 23, 2012 | Category: Trojans | Threat Level: 9/10
Downloader.Jadelile is a Trojan that downloads malicious browser plugins to substitute legal advertisements. Downloader.Jadelile also posts messages on the Facebook wall, which contain links to malicious websites. Once executed, Downloader.Jadelile creates several malicious files. Downloader.Jadelile also creates several registry entries. Downloader.Jadelile installs browser plugins for the web browsers such as Internet Explorer, Firefox and Chrome. Downloader.Jadelile creates a directory in %ProgramFiles% to gather executable Browser Helper Object (BHO) files. Downloader.Jadelile then...


Posted: May 23, 2012 | Category: Trojans | Threat Level: 9/10
Trojan.Ransomlock.P is a ransom Trojan that locks the desktop of the affected computer by making the PC unusable. Trojan.Ransomlock.P then asks the PC user to pay a ransom of 100 Euro to unlock the computer. Once executed, Trojan.Ransomlock.P creates several malicious files. Next, Trojan.Ransomlock.P modifies the registry by creating the certain registry entry so that it can run automatically whenever Windows starts. Next, Trojan.Ransomlock.P also creates and modifies several registry entries in order to disable Registry Editor, Windows Task Manager, and System Configuration. Then,...

Celas Trojan

Posted: May 22, 2012 | Category: Trojans | Threat Level: 9/10
Screenshot The Celas Trojan is a new ransomware Trojan that uses the brand name of a Europe-based music-licensing company to make its ransom attacks look legitimate. Like similar ransomware Trojans (such as the Gema 'Access to your computer was denied' Virus ), Celas Trojans claim that your PC is involved in file-trafficking crimes that require a monetary penalty to remove its system lock down. However, Celas Trojan doesn't have any form of real legal authority, and malware research team additionally emphasizes that Celas Trojans aren't linked to the real CELAS in any way....


Posted: May 22, 2012 | Category: Trojans | Threat Level: 9/10
Troj/Agent-WHZ is a Trojan that is included in a spam Facebook campaign related to account cancellation. The fake email that distributes Troj/Agent-WHZ asks the affected PC user to confirm account cancellation by clicking on the given link. However, the link doesn't take a PC user to an official Facebook web page, but a third-party application running on the Facebook platform, which means that the link goes to a address, and thus, can confuse unwary online users. If a PC user clicks on the link, a message asking if he/she wants to allow an unknown Java application to run on...


Posted: May 22, 2012 | Category: Rootkits | Threat Level: 10/10
Win32:Sirefef-AO is a rootkit which can access the compromised PC system through the security holes. Win32:Sirefef-AO is closely associated with rogue security applications, and might be used to distribute them to the targeted machines. Win32:Sirefef-AO can also operate as a single infection and, thus, initiate distributed denial of services (DDoS) attacks, collect and steal personal information, cause annoying web browser redirects on the search engines and many more. Win32:Sirefef-AO's payload includes changing web browser settings on the affected PC so that it would access suspicious...


Posted: May 22, 2012 | Category: Trojans | Threat Level: 9/10
While economic troubles throughout the world have led to many people pinching pennies (and equivalent currencies), Trojan.Fraud.A is a scamware program that's designed to take advantage of increasingly desperate fiscal straits. By waving offers of helping you make vast amounts of money from home if you're willing to download its promoted 'How To Earn Money' program, Trojan.Fraud.A makes it tempting to give the product a try for a mere forty to fifty dollars. However, Trojan.Fraud.A's promoted program is just a second affiliate product that offers strategies on illegal mass-e-mailing...


Posted: May 22, 2012 | Category: Worms | Threat Level: 5/10
Worm:Win32/Morto!dat is a worm that usually affects local network computers. Worm:Win32/Morto!dat spreads through the local networks by means of cracking accounts with weak passwords. Worm:Win32/Morto!dat executes a payload of harmful type. Worm:Win32/Morto!dat stops numerous processes and deletes important information from comrpomised machines. Use a legitimate anti-malware program to get rid of Worm:Win32/Morto!dat as early as possible.

Torrent Alert Fake Message

Posted: May 22, 2012 | Category: Fake Warning Messages
Torrent Alert fake messages are pop-ups that are caused by members of Win32/FakeVimes, a group of fake anti-malware and security programs. Although Torrent Alert fake messages, similar to ransomware Trojans, warn that your computer has been associated with supposedly illegal file-downloading activities, these alerts aren't based on reality and don't have anything to do with whether or not you've used torrents or downloaded any particular type of file. Instead of being legitimate alerts, Torrent Alert fake messages are just one of many types of fake warnings that are used by scamware such as...


Posted: May 22, 2012 | Category: Trojans | Threat Level: 8/10
Tearspear is a Trojan downloader that is created to access remote websites and download some malicious software programs to the affected computer system. Tearspear drops additional malware threats and, thus, makes the targeted system unstable. TearSpear will load on every system restart. Tearspear will try to connect to remote control servers and run the commands indicated or distribute other malware infections. Tearspear and the malware infections it distributes will gan access to all your computer data, especially if administrative account is compromised. Thus, all your passwords,...
previous  320  321  322  323  324  325  326  327  328  329  330  331  332  333  334  335  336  337  338  339  340  next     total items: 19109
Home "Articles"