Exploit:Win32/Pdfjsc.ADE

Posted: November 7, 2012 | Category: Trojans
Exploit:Win32/Pdfjsc.ADE is a Javascript Trojan that propagates as a specially crafted .PDF file that exploits a vulnerability in Adobe Acrobat and Adobe Reader. The vulnerabilities, discussed in CVE-2010-0188, allow Exploit:Win32/Pdfjsc.ADE to download and execute potentially malicious arbitrary files. Adobe Acrobat and Adobe Reader earlier than 8.2.1 and Adobe Acrobat and Adobe Reader earlier than 9.3.1 are vulnerable to the certain exploit. Exploit:Win32/Pdfjsc.ADE is distributed via a...

TrojanProxy:JS/Banker.AC

Posted: November 7, 2012 | Category: Trojans
TrojanProxy:JS/Banker.AC is a JavaScript Trojan that steals a victim's personal information, such as logon details, from specific Brazilian banking websites. TrojanProxy:JS/Banker.AC is downloaded and installed on the compromised machine by other malware threats. TrojanProxy:JS/Banker.AC steals sensitive information that includes account login details, such as your user name and password, and any other information a PC users inputs on the website, by intercepting data sent between the...

PWS:HTML/Barfraud.AP

Posted: November 7, 2012 | Category: Trojans
PWS:HTML/Barfraud.AP is a password-stealing Trojan that is detected as a malicious website. A phishing website conceals itself as a genuine Barclays bank website. PWS:HTML/Barfraud.AP attempts to steal sensitive details and online banking information from affected computer users to make fraud. PWS:HTML/Barfraud.AP spreads via a spam email, which invites or requests a recipient to fill in his/her online banking or credit or debit card details. If a PC users clicks 'submit' or 'update' or a...

Trojan:Win32/Sirefef.AN

Posted: November 7, 2012 | Category: Trojans
Trojan:Win32/Sirefef.AN is a rootkit Trojan that hides itself on the targeted computer to avoid detection and removal by security software. Therefore, Trojan:Win32/Sirefef.AN is difficult to detect and remove from the compromised PC. Trojan:Win32/Sirefef.AN hijacks the affected web browser and causes annoying redirects to suspicious advertising websites designed by scammers to make money from the pay-per-click technique and increased traffic. The list of the websites used by...

Backdoor.ADDNEW

Posted: November 6, 2012 | Category: Backdoors
Backdoor.ADDNEW is an updated variant of DaRK DDoSer, a backdoor Trojan that's used primarily to crash websites with artificially-generated traffic. Besides including stereotypical DDoS capabilities, Backdoor.ADDNEW also has spyware-related features that let Backdoor.ADDNEW steal personal information, such as passwords, from the infected PC. SpywareRemove.com malware researchers have discovered that current Backdoor.ADDNEW attacks are heavily intertwined with the presence of Gh0st RATs, which...

IRMA (BSA) Virus Ransomware

Posted: November 6, 2012 | Category: Ransomware
IRMA (BSA) Virus Ransomware IRMA (BSA) Virus is one of the newest ransomware Trojans to jump on the popular bandwagon of exploiting copyright media issues to attack random PC users. IRMA (BSA) Virus pretends to be a warning from the Information Resources Management Association, but SpywareRemove.com malware experts have confirmed IRMA (BSA) Virus's true identify as criminally-coded and fraudulent malware. The IRMA (BSA) Virus warns its victims that they're required to pay over two hundred dollars to due...

Backdoor:Win32/Talsab.C

Posted: November 6, 2012 | Category: Backdoors
Backdoor:Win32/Talsab.C is a multipurpose Trojan that steals personal information from your computer while also allowing criminals to access the compromised PC from a remote server. Like the majority of backdoor Trojans, Backdoor:Win32/Talsab.C doesn't display deliberate symptoms of its functions – even though Backdoor:Win32/Talsab.C can be used for causing unwanted system changes, blocking programs, installing other PC threats, deleting files or capturing text/visual/audio information....

Backdoor:Win32/Bezigate.A

Posted: November 6, 2012 | Category: Backdoors
Backdoor:Win32/Bezigate.A is a backdoor Trojan that lets criminals control your PC by exploiting hidden vulnerabilities. While Trojans that are founded on an identical code as Backdoor:Win32/Bezigate.A Trojans have been known to steal confidential information, Backdoor:Win32/Bezigate.A may be used to launch other attacks – particularly those that involve the installation of other malware or disabling your security programs. Because Backdoor:Win32/Bezigate.A doesn't have symptoms, uses file...

TrojanSpy:Win32/SSonce.C

Posted: November 6, 2012 | Category: Trojans
TrojanSpy:Win32/SSonce.C is a spyware Trojan that collects various types of confidential information from the compromised PC, all without displaying symptoms of its attacks. Besides stealing personal data, TrojanSpy:Win32/SSonce.C also has been found to exhibit downloading features that could be used to install other malware onto your computer. SpywareRemove.com malware researchers especially encourage you to update your anti-malware software against TrojanSpy:Win32/SSonce.C and its...

BKDR_XTRAT.B

Posted: November 6, 2012 | Category: Backdoors
When Generic Dropper.p was recently identified being used to attack Israeli police agencies, SpywareRemove.com malware researchers were still analyzing its payload. The malware that's installed by Generic Dropper.p has turned out to be BKDR_XTRAT.B, a standard backdoor Trojan or RAT that includes information-stealing functions along with other backdoor-based security attacks. Although Israel's police department is the last confirmed target of BKDR_XTRAT.B, BKDR_XTRAT.B also has a history of...

Boxore Client

Posted: November 6, 2012 | Category: Adware
The Boxore Client software that is published by Boxore OU is promoted at Boxore.com as a shopping advisor that can make product recommendations based on your online preferences, and help you make smart purchases. One of the main selling points of the Boxore Client app is that your anonymity is guaranteed as well as your safety, but that is not entirely accurate. Security analysts took a look at the source code of the Boxore Client app and reported that it falls into the category of adware...

Adware.WindowLivePot.A

Posted: November 6, 2012 | Category: Adware
Adware.WindowLivePot.A is an adware parasite that could lead to unwanted website redirects or the viewing of multiple pop-up ads attempting to advertise products or online savings. Some of the sites redirected from links in rendered ads could be phishing sites designed to pilfer personal information from you. Systems infected with Adware.WindowLivePot.A will have it running in the background and loading when Windows starts up. Most times systems with Adware.WindowLivePot.A present will suffer...

HackTool:Win32/Welevate

Posted: November 5, 2012 | Category: Malware
HackTool:Win32/Welevate is a malicious application that mainly affects 32-bit computers. HackTool:Win32/Welevate is also used by rogue anti-spyware programs. HackTool:Win32/Welevate displays a fake pop-up security alert on the desktop of the infected computer. HackTool:Win32/Welevate may appear as a helpful program but, in truth, it is a security threat to computer security because it may result in system malfunctions. HackTool:Win32/Welevate is used as a hacktool for remote attackers to...

TSPY_PIXSTEAL.A

Posted: November 5, 2012 | Category: Trojans
TSPY_PIXSTEAL.A is a Trojan that steals pictures from the infected PC by creating copies of the files that are sent to a remote server. TSPY_PIXSTEAL.A's unusually pic-grabbing attack can snatch up to twenty thousand separate files at one time, making TSPY_PIXSTEAL.A a rich potential source of compromised visual data and resources. SpywareRemove.com malware experts haven't found any symptoms associated with TSPY_PIXSTEAL.A, which tries to avoid being detected while TSPY_PIXSTEAL.A attacks the...

TrojanDropper:Win32/Dwonk.A

Posted: November 5, 2012 | Category: Trojans
TrojanDropper:Win32/Dwonk.A is a Trojan that downloads and installs other malware threats on the targeted computer system. TrojanDropper:Win32/Dwonk.A runs from where it was executed in order to execute its payload. TrojanDropper:Win32/Dwonk.A does not install itself on the vulnerable computer. TrojanDropper:Win32/Dwonk.A downloads an executable file (.exe) with an eleven-character file name into the %Temp% folder. TrojanDropper:Win32/Dwonk.A also downloads a .dll file with an eight-character...

Generic Dropper.p

Posted: November 5, 2012 | Category: Trojans
Generic Dropper.p is a generic label for a Trojan dropper that installs malicious software onto your computer – either without your consent or by misrepresenting its payload as beneficial. Even though Generic Dropper.p can be used in an immense range of attacks, the most recent Generic Dropper.p activities have centered on e-mail spam attacks that appear to be targeted at Middle Eastern law enforcement agencies. After being launched, Generic Dropper.p installs a variant of the Artemis Trojan...

Trojan.RedirRdll2.Gen

Posted: November 5, 2012 | Category: Trojans
Trojan.RedirRdll2.Gen is a rootkit Trojan that attempts to hide its existence on the infected computer and evade detection and removal of anti-virus programs. Trojan.RedirRdll2.Gen may hide files on the affected computer system by changing General Folder and File Options into 'hidden'. Trojan.RedirRdll2.Gen allows cybercrooks to gain remote access and control over the victimized PC. Trojan.RedirRdll2.Gen can hijack the targeted web browser and, thus, cause annoying web browser redirects to...

Trojan.Ransom.ANC

Posted: November 5, 2012 | Category: Trojans
Trojan.Ransom.ANC is a ransom Trojan that locks the desktop of the compromised PC by making the computer unusable. Trojan.Ransom.ANC is used to spread a certain ransomware. Trojan.Ransom.ANC displays a fake pop-up alert and accuses PC users of illegal activities such as downloading and distributing copyrighted content. Trojan.Ransom.ANC then asks the affected computer user to pay a ransom of a certain amount of money via Paysafecard or Ukash to unlock the PC. Once executed, Trojan.Ransom.ANC...

TROJ_FAKEAV.EHM

Posted: November 2, 2012 | Category: Trojans
TROJ_FAKEAV.EHM is a technical identification for Win 8 Security System , a new variant of rogue anti-malware software from the FakeRean family, which now is developing ransomware Trojans for the new Windows 8 OS. While TROJ_FAKEAV.EHM isn't capable of distributing itself, SpywareRemove.com malware researchers' current analyses point to TROJ_FAKEAV.EHM being installed automatically by exploits hosted on malicious sites. Besides pretending to be designed especially for Windows 8,...

JS/Phish

Posted: November 2, 2012 | Category: Viruses
JS/Phish is a virus that may cause unwanted redirects to the website, which masquerades as a form to enter credentials PC users are used to. JS/Phish may also lead to identity theft acting as a keylogger and intercepting data streams sent to websites associated with online transactions. JS/Phish may display a blank Internet screen, which states that it can't connect but locks the computer. JS/Phish can copy itself to circulate to other computer systems through the Internet, spam email...