Trojan.Downloader.Kuluoz.B

Posted: October 22, 2012 | Category: Trojans
Trojan.Downloader.Kuluoz.B is a Trojan that is a component of a spam malware attack posing as Booking.com the well-known agency for Internet hotel reservations. Trojan.Downloader.Kuluoz.B (TrojanDownloader: Win32/Kuluoz.B) spreads via spam emails that attempt to persuade recipients to open a file included in a .ZIP or .RAR archive that pretends to provide details of a booking. The spam Booking.com email states that a recipient's credit card couldn't be accepted as also that he/she must...

Troj/Agent-XXC

Posted: October 19, 2012 | Category: Trojans
Troj/Agent-XXC is a Trojan that fakes being a Windows component while achieving its attacks, which can include creating backdoor vulnerabilities, stealing personal information or installing other malware. Like many other PC threats of late, Troj/Agent-XXC is distributed with reliance on social engineering techniques that encourage victims to infect their own computers without being aware of the attack. Troj/Agent-XXC's e-mail spam messages portray Troj/Agent-XXC as a file sent by Youtube as...

Website-unavailable.com

Posted: October 19, 2012 | Category: Browser Hijackers
Website-unavailable.com is a default search engine domain that's loaded if your web browser has been configured to use OpenDNS settings and fails to find a valid destination (due to a mistyped URL or other reasons). SpywareRemove.com malware researchers can confirm that Website-unavailable.com is safe and that using Website-unavailable.com to search the web isn't harmful to your PC. However, OpenDNS, itself, has a mixed reputation that includes some PC security companies claiming to find...

Gen:Trojan.Heur.FU.au1@aSmMr2di

Posted: October 19, 2012 | Category: Trojans
Gen:Trojan.Heur.FU.au1@aSmMr2diis a Trojan that drops a malicious code from a remote server. When successfully downloaded and installed on the victimized computer system, Gen:Trojan.Heur.FU.au1@aSmMr2di performs its payload. Gen:Trojan.Heur.FU.au1@aSmMr2di allows attackers to gain remote access and control over the infected computer. Gen:Trojan.Heur.FU.au1@aSmMr2d may proliferate via spam email attachments, and usually conceals or embraces PDF on its name. Once the computer user opens an...

Eenheid Voor de Bestrijding Cybercrime Ransomware Virus

Posted: October 19, 2012 | Category: Ransomware
The Eenheid Voor de Bestrijding Cybercrime Virus, while it looks and acts like an alert from a Netherlands police agency, actually is a ransomware Trojan that aims to steal money by making its victims think that they're in legal trouble. Like similar PC threats from its family (identified by SpywareRemove.com malware experts as a branch of Reveton ), the Eenheid Voor de Bestrijding Cybercrime is an alert that's displayed after the victim's region, according to his or her IP address, has been...

Trojan horse Exploit_c.VRA

Posted: October 18, 2012 | Category: Trojans
Trojan horse Exploit_c.VRA is a malicious PDF file that's used to install other malware – with current Trojan horse Exploit_c.VRA payloads being set to install spyware programs. Updating Adobe software can prove to be an easy defense against Trojan horse Exploit_c.VRA, which leans on outdated exploits for attacking your PC. Since Trojan horse Exploit_c.VRA should be detectable by most well-designed anti-malware programs, SpywareRemove.com malware researchers also recommend that you pay...

Exploit Exp/JAVA.Niabil.gen

Posted: October 18, 2012 | Category: Malware
Exploit Exp/JAVA.Niabil.gen is a malware threat that is often detected in C:\Users\folder. Exploit Exp/JAVA.Niabil.gen might be specific to a certain PC user's account on the infected computer. Since Exploit Exp/JAVA.Niabil.gen executes its payload only within single PC user's environment, its background effects will disturb anyone who will use the affected computer. Exploit Exp/JAVA.Niabil.gen exploits several vulnerabilities to download itself into attacked computers. You should patch...

WIN32.BHO.acw

Posted: October 18, 2012 | Category: Adware
WIN32.BHO.acw is an adware, which hijacks the targeted web browser by adding a malicious browser helper object (BHO). WIN32.BHO.acw modifies DNS settings and HOSTS file; therefore, WIN32.BHO.acw will redirect your search results in any search engine to advertising websites designed by scammers to raise traffic and earn money from a pay-per-click technique. WIN32.BHO.acw may modify the web browser's appearance by adding extensions, for example, a tricky instant search toolbar.

Northern Constabulary E-Crime Unit Ransomware Virus

Posted: October 18, 2012 | Category: Ransomware
The Northern Constabulary E-Crime Unit Virus is one of several ransomware Trojans that focus on stealing money from the pockets of residents of the United Kingdom. To achieve this unsavory goal, the Northern Constabulary E-Crime Unit Virus claims to be authorized to lock your computer and even threatens you with further legal penalties if you don't pay its fine posthaste. SpywareRemove.com malware researchers are confident in declaring Northern Constabulary E-Crime Unit Virus as a malicious...

Norsk Politi Institutt for Cybercrime Ransomware Virus

Posted: October 18, 2012 | Category: Ransomware
Norsk Politi Institutt for Cybercrime Ransomware Virus The Norsk Politi Institutt for Cybercrime Virus is a rare showing of a ransomware Trojan that attacks the nation of Norway, as an example of the prolific nature of ransomware-based PC threats that are happy to single out the nationalities of victims throughout Europe. While the country that Norsk Politi Institutt for Cybercrime Virus targets is enough to differentiate Norsk Politi Institutt for Cybercrime Virus from its brethren, Norsk Politi Institutt for Cybercrime Virus is consistent with...

PC Defender Plus Firewall Alert

Posted: October 17, 2012 | Category: Fake Warning Messages
PC Defender Plus Firewall Alert is a fraudulent pop-up warning that's used by PC Defender Plus, a member of the ' PC Defender ' branch of the FakeRean family of rogue anti-malware scanners. PC Defender Plus Firewall Alert warns about a random type of malware, such as a Trojan or keylogger, that's attempting to access the Internet but supposedly was blocked by PC Defender Plus Firewall Alert's associated software. However, PC Defender Plus Firewall Alert's software can't detect real infections...

Exploit:SWF/ShellCode.L

Posted: October 17, 2012 | Category: Trojans
Exploit:SWF/ShellCode.L is a Trojan that spreads as a specially-crafted SWF (ShockWave Flash) file. Exploit:SWF/ShellCode.L exploits a vulnerability found in Adobe Flash Player prior to version 10.1.85.3. An attacker who successfully exploits the vulnerability could potentially run a malicious code and take control of the targeted computer. After successful exploitation, Exploit:SWF/ShellCode.L strives to download an encrypted binary file from a specified URL. If the file is downloaded...

TrojanDownloader:Win32/Spycos.R

Posted: October 17, 2012 | Category: Trojans
TrojanDownloader:Win32/Spycos.R is Trojan that downloads and executes other PC threats from a remote server. TrojanDownloader:Win32/Spycos.R also terminates security processes and services, and steals information about the affected computer. Once installed, TrojanDownloader:Win32/Spycos.R makes system changes by adding potentially malicious files. TrojanDownloader:Win32/Spycos.R blocks AVG and Avast security programs from normal working by terminating processes and services of anti-virus...

TSPY_ZBOT.LAG

Posted: October 17, 2012 | Category: Trojans
TSPY_ZBOT.LAG is one of two of the most recently-identified variants of the Zeus Trojan, a spyware program that uses highly-advanced techniques to steal information from cookies, e-mail address books and especially bank accounts. Both TSPY_ZBOT.LAG and its fellow variant, TSPY_ZBOT.AMM , use e-mail spam and a third PC threat, the Trojan downloader TSPY_FAREIT.SMC , to infect new computers. Avoiding e-mail links that redirect to Flash updates will help barricade infection vectors for...

TSPY_ZBOT.AMM

Posted: October 17, 2012 | Category: Trojans
TSPY_ZBOT.AMM is a variant of Zeus (also referred to as Zbot or, more rarely Wsnpoem ) that uses advanced attacks to harm your PC's security while TSPY_ZBOT.AMM steals e-mail and bank-related information. Like any variant of Zeus , TSPY_ZBOT.AMM is very difficult to detect without advanced anti-malware tools and can compromise bank accounts without any symptoms of its actions appearing on your screen. SpywareRemove.com malware researchers recommend two main forms of protection against...

TSPY_FAREIT.SMC

Posted: October 17, 2012 | Category: Trojans
TSPY_FAREIT.SMC is a Trojan downloader that installs variants of Zeus spyware onto the affected computers. TSPY_FAREIT.SMC's payloads then proceed to steal confidential information, with an emphasis on e-mail addresses, passwords, bank account information and cookie-stored data. Even by itself, TSPY_FAREIT.SMC has been found to be able to steal account and login information for various file managers and FTP clients. The latest TSPY_FAREIT.SMC attacks, as analyzed by SpywareRemove.com malware...

W32.Flamer.B

Posted: October 16, 2012 | Category: Worms
W32.Flamer.B is a malware module that was only identified recently due to the niche, targeted nature of its functions. As can be guessed from its name, SpywareRemove.com malware analysts have found W32.Flamer.B to be associated with the Flame malware (also known as Flamer or Skywiper) that was used to attack industries in the Middle East. However, W32.Flamer.B can operate separately from the main Flame program and doesn't require its presence to conduct attacks. Unless you work for a...

TrojanDropper:Win32/Lisfel.A

Posted: October 16, 2012 | Category: Trojans
TrojanDropper:Win32/Lisfel.A is a Trojan that downloads other Lisfel components on the infected computer system. When installed on the compromised PC, TrojanDropper:Win32/Lisfel.A makes system changes by dropping potentially malicious files and adding registry entries. TrojanDropper:Win32/Lisfel.A modifies the certain registry entry so that it can run its downloaded component every time you start Windows. TrojanDropper:Win32/Lisfel.A may come in the affected computer via malware infections...

Exploit:Win32/Pdfjsc.ADF

Posted: October 16, 2012 | Category: Trojans
Exploit:Win32/Pdfjsc.ADF is a Trojan that spreads as a specially-crafted PDF file, which targets software vulnerabilities in Adobe Acrobat and Adobe Reader. The vulnerabilities, discussed in CVE-2010-0188, allow Exploit:Win32/Pdfjsc.ADF to download and execute arbitrary files. Exploit:Win32/Pdfjsc.ADF may be faced when visiting a compromised website that hosts the malicious file, and has been observed to be spread via the 'Blackhole exploit pack'. The PDF file encompasses a malicious...

Backdoor:Win32/IRCbot.GX

Posted: October 16, 2012 | Category: Backdoors
Backdoor:Win32/IRCbot.GX is a backdoor Trojan that propagates via removable drives. Backdoor:Win32/IRCbot.GX allows attackers to gain unauthorized access and control of an infected computer via IRC. Backdoor:Win32/IRCbot.GX logs keystrokes and steals personal information from victims. Once installed, Backdoor:Win32/IRCbot.GX copies itself to the ceratin locations of the corrupted computer system. Backdoor:Win32/IRCbot.GX downloads and executes potentially malicious files and modifies the...