Mariposa

Posted: August 17, 2012 | Category: Malware
Mariposa (Spanish for 'butterfly'), also known as Rimecud , is a group of multi-component worms that include backdoor Trojan functions (such as enabling DDoS-causing botnets), as well as optional spyware components. Although Mariposa's servers were dismantled by legal authorities, Mariposa managed to achieve a name for itself by infecting anywhere from eight to twelve million PCs before Mariposa was shut down. Mariposa is once again in the eyes of the news media due to the ongoing trial of...

Shamoon

Posted: August 17, 2012 | Category: Malware
Shamoon Shamoon, also known as Disttrack , is an unusually-destructive worm that overwrites the Master Boot Record (or MBR) to cause permanent damage to your operating system – making it essentially impossibles to boot your PC without repairing the OS. Shamoon's attacks also transmit basic information about your PC and appear to be targeting specific companies in China's energy industry. Because Shamoon, as a worm, includes features to distribute itself through removable and network-shared drives,...

Cybercrime Investigation Department Virus

Posted: August 17, 2012 | Category: Ransomware
Cybercrime Investigation Department Virus The Cybercrime Investigation Department Virus is a ransomware Trojan that targets Canadian PCs and displays an alert claiming that your system has been locked as a consequence of Internet-related criminal activities. Cybercrime Investigation Department Virus's pop-up insists that you pay fine via Ukash to avert potential penalties that supposedly include up to nine years in prison, but these threats are completely fabricated, and SpywareRemove.com malware researchers don't see any reason to...

Troj/JSRedir-IA

Posted: August 17, 2012 | Category: Trojans
Troj/JSRedir-IA is a browser-redirecting JavaScript Trojan that's used to download and install other PC threats onto your computer, with recent Troj/JSRedir-IA attacks centering around fake Olympics news e-mails and websites. Trojans associated with Troj/JSRedir-IA include Troj/Agent-XIK , which also has downloading capabilities and may include backdoor functions that would allow criminals to compromise your PC through a C&C server. JavaScript-based browser security measures, along with...

Troj/Agent-XIK

Posted: August 17, 2012 | Category: Trojans
Troj/Agent-XIK is a Trojan that connects to malicious servers for the purpose of downloading and installing other PC threats, and may also be used to compromise your control over your PC. Attacks by Troj/Agent-XIK began along with the London Olympics, which were convenient excuses to send out fraudulent e-mail messages with fake Olympics news links; these links eventually paved the way to Troj/Agent-XIK. If you, as SpywareRemove.com malware researchers advise, avoid clicking on suspicious...

BKDR_BRIBA.EVL

Posted: August 17, 2012 | Category: Backdoors
BKDR_BRIBA.EVL is a backdoor Trojan that connects to a (currently disabled) C&C server to download and execute other malicious files. Typical BKDR_BRIBA.EVL attacks involve its installation via a Trojan dropper, TROJ_MDROP.EVL , which is distributed by e-mail spam. Because the installation process for BKDR_BRIBA.EVL exploits Flash vulnerabilities, SpywareRemove.com malware researchers especially encourage potential victims of attacks to update Adobe Flash Player as required to close...

TROJ_MDROP.EVL

Posted: August 17, 2012 | Category: Trojans
TROJ_MDROP.EVL is an aptly-named Trojan dropper that uses Adobe Flash vulnerabilities to install a second Trojan on your computer. Because TROJ_MDROP.EVL's propagation is handled primarily by e-mail file attachments, SpywareRemove.com malware experts note that avoiding suspicious e-mail-distributed files (or scanning them before opening them) should be considered an effective defense against TROJ_MDROP.EVL's attack, which installed a backdoor Trojan. The Trojan that TROJ_MDROP.EVL installs...

JS/Drop.Delf.NK.24.D

Posted: August 17, 2012 | Category: Trojans
JS /Drop.Delf.NK.24.D is a Java Trojan that adds its body onto the affected computer system exploiting vulnerabilities in applications based on the Delphi programming language. JS/Drop.Delf.NK.24.D is downloaded simultaneously into several locations on the compromised PC. JS/Drop.Delf.NK.24.D attempts to use hidden attribute to its components. JS/Drop.Delf.NK.24.D also uses rootkit techniques to avoid detection and removal by security software.

Trojan.Zeroaccess.C

Posted: August 16, 2012 | Category: Trojans
Trojan.Zeroaccess.C is an alternative of the ZeroAccess rootkit, also known as Max++ or Sirefef, that uses file-downloading attacks to install other PC threats, along with potentially stealing confidential information, altering web browser pages and infecting native Windows files. Because Trojan.Zeroaccess.C, like all variants of Sirefef , is a high-level threat that will attempt to avoid your attention while Trojan.Zeroaccess.C circumvents your PC security, SpywareRemove.com malware experts...

BKDR_ZACCESS.KP

Posted: August 16, 2012 | Category: Backdoors
BKDR_ZACCESS.KP is a Trojan dropper that's used to install other components of a ZeroAccess infection. The exact installation routine that BKDR_ZACCESS.KP uses may or may not display symptoms, depending on the level of the Windows account's user privileges, and a symptomless install is far from rare. Because BKDR_ZACCESS.KP is most-often distributed by P2P networks as fake gaming cracks and other pirated forms of software, SpywareRemove.com malware experts recommend that you scan suspicious...

BKDR_ZACCESS.SMQQ

Posted: August 16, 2012 | Category: Backdoors
BKDR_ZACCESS.SMQQ is a ZeroAccess-based Trojan that displays a fake Adobe software pop-up as part of the installation process for other ZeroAccess-related PC threats. BKDR_ZACCESS.SMQQ's attack only appears for nonadministrator Windows accounts that require privilege elevation before the rest of the malware can be installed. Because BKDR_ZACCESS.SMQQ is always part of a multi-component attack that involves several types of ZeroAccess Trojans or rootkits, SpywareRemove.com malware experts...

W32.Disttrack

Posted: August 16, 2012 | Category: Worms
W32.Disttrack is an upgraded variant of the dreaded Shamoon, a worm that invoked significant interest from PC security companies due to its direct attacks against crucial components in the system boot process. Besides including Shamoon's previous features, W32.Disttrack has widened its path of destruction to encompass many other files, including media-related content, and can be even more dangerous to the contents of your PC than the already-vicious Shamoon worm. SpywareRemove.com malware...

Trojan.Tracur.C!inf

Posted: August 16, 2012 | Category: Trojans
Trojan.Tracur.C!inf is a label for files that have been infected by Trojans from the Tracur family – a family noted for causing search engine redirects to malicious websites and installing other PC threats. Because Trojan.Tracur.C!inf is only applied to normal system files that have been compromised by Tracur Trojans, SpywareRemove.com malware researchers encourage you to disinfect such files safely with dedicated anti-malware scanners. PC threats related to Trojan.Tracur.C!inf have been...

Nsis:Adware-CJ

Posted: August 16, 2012 | Category: Adware
Nsis:Adware-CJ is a PUP or Potentially Unwanted Program-based detection for Zona, a search engine program that focuses on downloadable movies. While Zona is marketed primarily for Russians, recent unwanted Nsis:Adware-CJ installations have been noted in the PCs of English-speakers users, along with a marked resistance to normal deletion methods. Because Nsis:Adware-CJ has a high chance of being a low-level security risk and a source of performance destabilization for your PC,...

Police Ransomware Virus

Posted: August 15, 2012 | Category: Ransomware
As a 'subgenre' of the already-profitable ransomware Trojan industry, Police Ransomware are responsible for an estimate of millions of criminal profit in computer-infecting scams that lock down the afflicted PCs. While Police Ransomware originally limited their usage to the relatively authoritarian state of Russia, modern Police Ransomware are designed for a large range of countries, with a specific focus on economically high-end targets like the United States and Europe. Ransom messages from...

Trojan.Zeroaccess!inf4

Posted: August 15, 2012 | Category: Trojans
Trojan.Zeroaccess!inf4 is a dangerous Trojan horse designed with the intention of compromising data stored on the infected PC. Remote connections may be initiated through Trojan.Zeroaccess!inf4 where a remote attacker could infiltrate the system. It is best to take immediate action to remove Trojan.Zeroaccess!inf4 with an updated antimalware program.

Trojan Horse Generic29.GJG

Posted: August 15, 2012 | Category: Trojans
Trojan Horse Generic29.GJG is a Trojan horse that uses sneaky methods to connect to remote sources. A remote hacker may utilize Trojan Horse Generic29.GJG to connect to an infected PC. Trojan Horse Generic29.GJG puts a system at risk of data theft and serious performance decrease. It is best that an antimalware program be used to safety detect and remove Trojan Horse Generic29.GJG and any related malware files.

Backdoor.Agent.RC2Gen

Posted: August 15, 2012 | Category: Backdoors
Backdoor.Agent.RC2Gen is a generic detection for a backdoor Trojan that makes contact with an external server as a means of allowing criminals to access and potentially control your computer. As a heuristic detection, Backdoor.Agent.RC2Gen can apply to different variants of backdoor Trojans, although SpywareRemove.com malware researchers have found that recent attacks by Backdoor.Agent.RC2Gen do bear some distinctive traits – such as using randomly-named EXE files, tampering with the Windows...

Troj/JavaDl-FC

Posted: August 15, 2012 | Category: Trojans
Troj/JavaDl-FC is a computer Trojan that may bring about a threat to personal data stored on an infected PC. Troj/JavaDl-FC could load other malware parasites and then open up a system to remote attackers. A remote user may be able to utilize Troj/JavaDl-FC to steal data from an infected system without any indication to the PC user. Troj/JavaDl-FC may also block access to certain parts of a PC.

Flame

Posted: August 14, 2012 | Category: Worms
Flame is a worm that uses multiple components to compromise your PC's privacy and security, potentially stealing information in the process. Like Stuxnet , Mahdi or the recent Gauss , Flame is suspected to be used as a form of targeted PC warfare against Middle Eastern governments such as Iran. Consequentially, Flame isn't likely to be afflicted on civilian computers, although its capability to spread through removable media devices makes Flame a potential threat even to PCs that lack...