PWS:HTML/Phish.CO

Posted: September 13, 2012 | Category: Trojans
PWS:HTML/Phish.CO is a Trojan that spreads as an HTML file and pretends to be from legitimate websites in order to steal your personal information. PWS:HTML/Phish.CO spreads via malicious HTML email messages or through infected websites. PWS:HTML/Phish.CO attempts to steal confidential information including a person's full name, date of birth, address, phone number, bank account details, telephone banking passcodes, five-digit passcodes, bank name and email addresses.

PWS:Win32/Zbot.gen!AJ

Posted: September 13, 2012 | Category: Trojans
PWS:Win32/Zbot.gen!AJ is a password-stealing Trojan that also opens a back door on the compromised PC and, thus, allows attackers to gain remote access and control over the affected computer. PWS:Win32/Zbot.gen!AJ can reduce the hijacked web browser's security, steal computer data and a victim's personal information such as online banking information, network credentials and browsing history. PWS:Win32/Zbot.gen!AJ is usually spread via spam emails or through hijacked websites....

Trojan.Win32.Urelas

Posted: September 12, 2012 | Category: Trojans
Trojan.Win32.Urelas is a Trojan, which can destroy the affected Windows computer and steal personal information from its victims with the aim of profiting and distributing its malicious files. Trojan.Win32.Urelas can remove a PC user's administrative privileges, involve your name into illegitimate activities and slow down your computer system. Trojan.Win32.Urelas does not have an interface and, thus, stays hidden from detection of anti-virus programs. All of malicious files of...

Adware:Win32/WinAgir

Posted: September 12, 2012 | Category: Adware
Adware:Win32/WinAgir is an adware application that gathers the PC user's browsing behavior and search engine queries in order to serve targeted advertising to the affected computer owner. Adware:Win32/WinAgir also updates and downloads other potentially malicious files, and communicates with a remote server without adequate PC user's permission. Adware:Win32/WinAgir creates several registry subkeys and entries to enable itself as a service and install its Browser Helper Object (BHO)...

Trojan:Win32/Delf.LN

Posted: September 12, 2012 | Category: Trojans
Trojan:Win32/Delf.LN is a Trojan that reports and intercepts Internet traffic and may also drop potentially unwanted programs onto the affected computer. Once installed, Trojan:Win32/Delf.LN creates several files and registry entries. Trojan:Win32/Delf.LN may be distributed by other malware threats, or downloaded via drive-by downloads onto the compromised PC. While being executed, Trojan:Win32/Delf.LN strives to copy and install itself with the certain file name into the particular folder....

JS:ScriptPE-Inf

Posted: September 12, 2012 | Category: Trojans
JS:ScriptPE-Inf is a general label for malicious JavaScript code; JS:ScriptPE-Inf-related attacks tend to be associated with overtly malicious or hacked websites that load browser exploits without many (or any) visible symptoms. Because JS:ScriptPE-Inf is a generic alert, its attacks can result in any number of consequences for your computer, although some of the most popular such payloads include ZeroAccess rootkits, browser hijackers, ransomware Trojans from the Ukash Virus family and...

JS/Agent.Inf.6750

Posted: September 12, 2012 | Category: Trojans
JS/Agent.Inf.6750 is a Java Trojan that invades the targeted PC in the process of exchanging information between the host computer and web environment. JS/Agent.Inf.6750 spreads via malicious websites that includes an infected Java script. JS/Agent.Inf.6750 uses browser exploits to execute a payload from a randomly-generated domain. JS/Agent.Inf.6750 can distribute additional damaging PC infections to your computer and use it for sending spam emails to your contact lists for 'pay per click'...

Backdoor.win64.zaccess.bt

Posted: September 12, 2012 | Category: Backdoors
Backdoor.win64.zaccess.bt is a component of a ZeroAccess (also known as Max++) rootkit that's specialized for 64-bit Windows environments – although other PC threats associated with ZeroAccess are perfectly capable of infecting 32-bit systems. Backdoor.win64.zaccess.bt attacks have taken a rise in late August/early September 2012, with the majority of victims using anti-malware software to detect Backdoor.win64.zaccess.bt but failing to undertake the proper procedures to remove...

Troj/Agent-OVJ

Posted: September 11, 2012 | Category: Trojans
Troj/Agent-OVJ is a trojan that's often distributed as part of the Darkshell Trojan, although recent Troj/Agent-OVJ attacks have used malicious Windows Help files to install Troj/Agent-OVJ specifically. This may be of particular concern to PC users based in Italy and other Italian-predominant countries, since the Trojan that initiates the attack that installs Troj/Agent-OVJ has been seen using Italian-based file names to entice victims to launch Troj/Agent-OVJ. Even though Troj/Agent-OVJ can...

Snap.do

Posted: September 11, 2012 | Category: Browser Hijackers
Snap.do Snap.do looks like a harmless search engine-based website, complete with a catchy 'all in a snap' slogan, but SpywareRemove.com malware experts have taken note of Snap.do's direct association with a browser hijacker that masquerades as a benign plugin – the Snap.do Smartbar. The Snap.do Smartbar is used to redirect your browser to Snap.do, transmit low-level personal information about your PC and bypass your normal browser settings. Like many forms of adware, Snap.do's browser add-on also...

Rootkit.Win32.Necurs.gen

Posted: September 11, 2012 | Category: Rootkits
Rootkit.Win32.Necurs.gen is a rootkit that serves other PC threats. Rootkit.Win32.Necurs.gen interacts with system processes and processes of other programs, especially where those attempt to manipulate with the components of objects Rootkit.Win32.Necurs.gen is instructed to support. Rootkit.Win32.Necurs.gen kills processes of fraudware or security applications that strive to kill processes of, and uninstall rogue security programs, such as Win 8 Security System. Rootkit.Win32.Necurs.gen...

Mal/DarkShell-A

Posted: September 11, 2012 | Category: Malware
Mal/DarkShell-A is a malware threat that is distributed via a malevolent help (.HLP) file by means of social engineering. Internet users are fooled into opening the malevolent file and, thus, corrupting their PCs with a spyware keylogger. If the infected file is opened, an error message is shown. In the background, another malicious file is downloaded onto the computer system, which in turn creates one more dangerous file. Mal/DarkShell-A records keystrokes of the computer user and transmits...

Troj/DarkDrp-A

Posted: September 11, 2012 | Category: Trojans
Troj/DarkDrp-A is a Trojan dropper that's used to install spyware onto your PC via attacks involving multiple PC threats. This attack starts with a malicious Windows Help file, Troj/HlpDrp-B , which launches Troj/DarkDrp-A as a fake Security Center file, with Troj/DarkDrp-A finally installing the keylogger Troj/Agent-OVJ . The only overt symptom of this attack is the general error message that appears when the victim attempts to view the original 'Help' file, and, thereafter, both...

Troj/HlpDrp-B

Posted: September 11, 2012 | Category: Trojans
Troj/HlpDrp-B is a Trojan dropper that uses the unusual disguise of a Windows Help File to make itself seem harmless to your computer. Opening this supposed 'help' file will result in a fairly nondescript error message, but SpywareRemove.com malware analysts have found that Troj/HlpDrp-B includes a hidden payload: a second Trojan ( Troj/DarkDrp-A ) that installs a spyware component from the Darkshell Trojan. Current attacks for Troj/HlpDrp-B appear to focus on Europe, particularly Italy,...

Infostealer.Limitail

Posted: September 11, 2012 | Category: Trojans
Infostealer.Limitail is a Trojan that steals personal information and computer data from the affected computer. Once executed, Infostealer.Limitail copies itself to the certain location and creates the certain folder. Infostealer.Limitail takes screen shots and saves them to the particular location on the compromised PC. Infostealer.Limitail creates the specific registry entry so that it can run automatically every time you start Windows. Infostealer.Limitail also logs keystrokes and title...

Backdoor.Elporat

Posted: September 11, 2012 | Category: Backdoors
Backdoor.Elporat is a backdoor Trojan that opens a back door on the infected computer. Backdoor.Elporat may drop other malware threats on the affected PC and steal personal information from the corrupted machine. Backdoor.Elporat can log keystrokes and transfer them to remote attackers. Backdoor.Elporat may be distributed as a malicious Microsoft Word document which exploits the Microsoft Office RTF File Stack Buffer Overflow Vulnerability (CVE-2010-3333). Once executed, Backdoor.Elporat may...

Alnaddy.com

Posted: September 11, 2012 | Category: Browser Hijackers
Alnaddy.com Alnaddy.com is an Arabic web portal that provides information and media content from diverse locations on the web. While Alnaddy.com's content is, so far, playing by all the expected rules for online safety, SpywareRemove.com malware research team has taken notice of browser hijackers that promote Alnaddy.com through changes to your browser's settings. Adware that promotes Alnaddy.com is still active in the wild, and attacks reported as recently as this month, although concrete distribution...

Virus.Alureon.H

Posted: September 10, 2012 | Category: Viruses
Virus.Alureon.H is a dangerous Trojan that may run undetected in the background while it allows remote access for hackers. Virus.Alureon.H could cause a system to perform poorly and even crash. At times various misleading messages may be rendered from the Virus.Alureon.H infection. Removing Virus.Alureon.H may be accomplished with an antispyware tool.

Trojan.Reveton.C

Posted: September 10, 2012 | Category: Trojans
Trojan.Reveton.C is a Trojan that changes the web browser settings in order to connect to remote servers. Trojan.Reveton.C is installed on the compromised PC without the PC user's permission and knowledge. Trojan.Reveton.C targets all web browsers by injecting a malicious code into legitimate process files such as firefox.exe, iexplore.exe, chrome.exe, and opera.exe and successfully compromising them in order to evade detection and removal of anti-virus software from the PC. Trojan.Reveton.C...

Backdoor.IRCbot.gen!Y

Posted: September 10, 2012 | Category: Backdoors
Backdoor.IRCbot.gen!Y is a backdoor Trojan that is used by attackers primarily to make a profit on a corrupted PC visiting websites based on the algorithm of IRC bot, which is a part of the malware threat. Backdoor.IRCbot.gen!Y establishes an unauthorized channel, through which attackers can control the IRC bot. An IRC bot is a client, such as Internet Explorer or Mozilla that is, program created to connect to the Internet that connects to servers specified by attackers and browse through...