Exp/20124681-A

Posted: August 30, 2012 | Category: Malware
Exp/20124681-A is an alert for a Blackhole Exploit Kit-based body of malicious Java code that exploits a vulnerability in JRE 7 to install malicious software. Early targeted attacks that used Exp/20124681-A's vulnerability were noted for installing PoisonIvy backdoor Trojans, although Exp/20124681-A's inclusion in the BEK, a configurable malware-delivering kit for hire, allows this exploit to be used for virtually any type of malicious software. SpywareRemove.com malware researchers...

Trojan GEN-Kryptik

Posted: August 30, 2012 | Category: Trojans
Trojan GEN-Kryptik is a Trojan that surreptitiously invades the infected computer and runs malicious files by exploiting software and security vulnerabilities. Trojan GEN-Kryptik can propagate via spam email attachments, IRC and file-sharing networks. Trojan GEN-Kryptik enables cybercriminals to gain remote access and control over the corrupted PC. Trojan GEN-Kryptik can also download and install more security threats on the targeted computer system. can then recreate itself making it very...

HTML:Script-inf

Posted: August 30, 2012 | Category: Viruses
HTML:Script-inf is a virus that is known as a generic detection for a malicious HTML script which exists on malicious websites. HTML:Script-inf signifies that a website being accessed is hijacked by a script that may drop other PC threats on the affected computer. The main aim of HTML:Script-inf is to block the script from performing malicious actions on the user's PC. When security software detects HTML:Script-inf on local files (offline), it implies that the computer is already corrupted....

United States Cyber Security Virus

Posted: August 30, 2012 | Category: Malware
United States Cyber Security Virus The United States Cyber Security Virus is a recent addition to a series of ransomware Trojans from the casually-nicknamed ' Ukash Virus ' family. Like all-but-identical Trojans, the United States Cyber Security Virus displays a pop-up that announces that you're guilty of violating both copyright and pornography-related laws regarding online media viewing/distribution. This pop-up threatens you with dire legal action, all of which can apparently be avoided if you pay a one hundred dollar...

Backdoor.RDPopen.A

Posted: August 30, 2012 | Category: Backdoors
Backdoor.RDPopen.A is a backdoor Trojan that can destroy the targeted computer system. Backdoor.RDPopen.A allows attackers to gain full remote access and control over the compromised PC. Backdoor.RDPopen.A downloads and installs other PC threats on the infected machine. Backdoor.RDPopen.A may invade the corrupted PC alongside with another malicious application. Malicious components of Backdoor.RDPopen.A can disable important system tool, such as Windows Registry Editor, Task Manager, and Safe...

Trojan.Zeroaccess!inf5

Posted: August 29, 2012 | Category: Trojans
Trojan.Zeroaccess!inf5 is a Trojan that is connected with Zeroaccess rootkit. Trojan.Zeroaccess!inf5 can spy on the victim's online activities and send logs to a remote PC. Trojan.Zeroaccess!inf5 might allow attackers to gain remote access and control over the targeted machine so that its IP could be used to cover the attacker's identity. Trojan.Zeroaccess!inf5 might be difficult to detect and remove from the infected computer by many security software.

Pup.Bprotector

Posted: August 29, 2012 | Category: Adware
Pup.Bprotector is an adware application that targets web browsers, specifically Google Chrome which might stop loading Flash, and Firefox which can show the 'Not responding' notification. Pup.Bprotector leads to numerous web browsing problems. The main purpose of Pup.Bprotector is to deploy an Internet surfing fraud which aims at ensuring numerous hits to specific web servers. Pup.Bprotector may damage the processes running on the affected PC.

Wiper

Posted: August 29, 2012 | Category: Malware
Wiper is a malware threat that systematically wipes a hard drive clean. Wiper targets computers that belong to the Iranian Oil Ministry and the National Iranian Oil Company. Wiper was created by cybercriminals to steal and harm data. Wiper also systematically erases system files, specifically with a .pnf extension, that causes the affected computer system to crash and prevents it from restarting. Wiper can create and delete a registry entry for a service called 'RAHDAUD64'. This points to a...

BKDR_POISON.BLW

Posted: August 29, 2012 | Category: Backdoors
BKDR_POISON.BLW is a backdoor Trojan that exploits a Java Runtime Environments (JRE) vulnerability. BKDR_POISON.BLW may be dropped by other PC threats from remote websites. BKDR_POISON.BLW connects to certain websites for sending and receiving information. BKDR_POISON.BLW performs malicious actions on the compromised PC. BKDR_POISON.BLW allows attackers to gain remote access and control over the vulnerable computer system. BKDR_POISON.BLW downloads and executes malicious files....

JAVA_GONDY.A

Posted: August 29, 2012 | Category: Trojans
JAVA_GONDY.A is a Trojan and component of a Java applet that exploits a Java Runtime Environment (JRE) vulnerability. JAVA_GONDY.A may be dropped by other PC threats from remote websites. JAVA_GONDY.A performs particular actions on the targeted computer system. JAVA_GONDY.A disables security features and downloads and runs binary components. JAVA_GONDY.A may also download and install other malware infections on the corrupted PC. JAVA_GONDY.A checks if the computer system is running a Windows...

JS_FIEROPS.A

Posted: August 29, 2012 | Category: Trojans
JS_FIEROPS.A is a Trojan that may spread via remote malicious HTML websites with a malicious JavaScript. JS_FIEROPS.A runs when a PC user visits the said dangerous websites. JS_FIEROPS.A connects to the certain websites for downloading and executing malicious files.

Java.Awetook

Posted: August 29, 2012 | Category: Trojans
Java.Awetook is a Trojan that exploits a zero-day vulnerability in the Java Runtime Environment (JRE) to escalate its privileges in order to download and execute a malicious payload on the affected computer. Java.Awetook may download the potentially malicious file onto the infected computer. Java.Awetook may also be used by web criminals to download and install additional PC threats. Java.Awetook allows cybercriminals to gain remote access and control over the corrupted PC.

Troj/Agent-XNN

Posted: August 29, 2012 | Category: Trojans
Troj/Agent-XNN is a Trojan that is used in a spammed-out malware attack. Troj/Agent-XNN spreads via spam email attachments. The fake email message pretends to be a Facebook notification that notifies the recipient he/she has been tagged by one of their friends in a newly uploaded photograph. The subject of the bogus email is 'Your friend added a new photo with you to the album'. The fraudulent Facebook email has a malicious file detected as Troj/Agent-XNN attached to it which is called...

JS:Blacole-AV

Posted: August 29, 2012 | Category: Trojans
JS:Blacole-AV is a Trojan infection that affects computer users who have an old Java version installed on their PCs. JS:Blacole-AV exploits the Java Runtime Environment vulnerability for invading the compromised machine. If installed successfully, JS:Blacole-AV can lead to numerous other exploits on the targeted PC. JS:Blacole-AV mainly propagates via unsafe websites. If the computer runs an exposed version of Java and the website is able exploit it, JS:Blacole-AV may be dropped onto the...

INF/Autorun, Conficker, Sirefef are the Most Common Malware in July 2012

Posted: August 29, 2012 | Category: Malware News
According to the ESET security firm, the top malware threat internationally in July 2012 was INF/Autorun. ESET also confirms from their malware statistics for July 2012, that this is the third year in a row that INF/Autorun has had a 5.46% infection rate worldwide. The INF/Autorun threat is associated with a variety of malware utilizing the autorun.inf as a means of compromising a computer. Computer experts and advanced PC users normally identify autorun.inf as a file containing...

‘Ads not by this site’ virus

Posted: August 28, 2012 | Category: Adware
The 'Ads not by this site' virus is an unusually polite form of adware that injects advertisement-related code into arbitrary web pages – while also being courteous enough to notify you about the lack of affiliation between the site and its advertisements. Due to the minor nature of its attacks, SpywareRemove.com malware researchers don't consider the 'Ads not by this site' virus to be any more than a low-level threat, although its advertisements may be used to promote more malicious PC...

Troj/MDrop-ELD

Posted: August 28, 2012 | Category: Trojans
Troj/MDrop-ELD, also known as Disttrack or Shamoon , is a Trojan generated to steal data and damage operations on a particular network. Troj/MDrop-ELD strives to overwrite the Master Boot Record (MBR) on the affected computer system, which would make it impossible to boot the PC. Troj/MDrop-ELD also substitutes files on the hard drive, substituting certain image and system file types with a corrupt JPG (JFIF) file. Troj/MDrop-ELD aims at collecting information about the targeted PC.

Cxweb/BadDlod-G

Posted: August 28, 2012 | Category: Malware
Cxweb/BadDlod-G is an alert for the domain ok.XXX4.net, which hosts malicious Java exploits as a method of attacking visiting PCs and infecting them with Trojans. You should only receive Cxweb/BadDlod-G warnings in cases of possessing active anti-malware software that can monitor your web-browsing habits for the purpose of filtering out harmful sites. Because sites that trigger Cxweb/BadDlod-G warnings have been noted for using zero-day Java exploits to install backdoor Trojans, you should...

Mal/JavaKnE-H

Posted: August 28, 2012 | Category: Malware
Mal/JavaKnE-H is a malicious Java applet that's used to install Trojans (such as the recently-identified Dropper.MsPMs and Troj/Agent-XNE ). If you have Java enabled in your browser, visiting a site that hosts Mal/JavaKnE-H results in automatic attacks against your PC, and even updating Java isn't an adequate defense – since Mal/JavaKnE-H's exploit hasn't had a corresponding patch to remedy this security flaw. SpywareRemove.com malware researchers have been unable to find any symptoms...

Troj/Agent-XNE

Posted: August 28, 2012 | Category: Trojans
Troj/Agent-XNE is a recently-detected backdoor Trojan and Trojan downloader that can install other PC threats, disable security-related features or grant remote attackers access to your computer. Currently, Troj/Agent-XNE is distributed via the same domain that's responsible for Dropper.MsPMs attacks by abusing a Java-based browser exploit. Contact this domain (ok.XXX4.net) with Java enabled for your browser is all that's necessary for your PC to be infected by Troj/Agent-XNE, which...