Rootkit.Boot.STT.a

Posted: August 10, 2012 | Category: Rootkits
Rootkit.Boot.STT.a is a rootkit that's often associated with the presence of rogue anti-malware products and PC threats that infect removable drives (such as worms). Rootkit.Boot.STT.a is still actively-distributed, although symptoms of Rootkit.Boot.STT.a attacks may not always readily visible. Like other rootkits, Rootkit.Boot.STT.a compromises your operating system's integrity to conceal itself, and SpywareRemove.com malware research team recommends that you use advanced anti-malware...

Trojan Agent.BVXGen

Posted: August 10, 2012 | Category: Trojans
Trojan Agent.BVXGen is a Trojan downloader that hides under a randomly-generated file name and installs other PC threats without your consent. SpywareRemove.com malware analysts have been unable to detect obvious symptoms related to Trojan Agent.BVXGen, which will try to avoid detection, although anti-malware products should be able to detect Trojan Agent.BVXGen and related PC threats either automatically or via manual system scans. Trojan Agent.BVXGen is often linked to fake Yahoo toolbars...

Win64/Patched.A

Posted: August 10, 2012 | Category: Trojans
Win64/Patched.A is a dangerous Trojan that may load malicious code causing web site redirects. Additionally, Win64/Patched.A may access remote sources where a hacker on the other end may be able to access data on the hard drive. Win64/Patched.A puts a system at risk of having information stolen. It is best to remove the threat of Win64/Patched.A by detecting and removing all related malware with an antispyware tool.

Trojan.Exprez!gen2

Posted: August 10, 2012 | Category: Trojans
Trojan.Exprez!gen2 is a dangerous Trojan horse that could load at startup causing the system to become unstable. Trojan.Exprez!gen2 may expose stored data to a remote hacker where a connection is initiated but undetected by the computer user. Eliminating the threat of Trojan.Exprez!gen2 may be done with the use of an updated antispyware tool.

Win32\ZAccess.EW

Posted: August 9, 2012 | Category: Trojans
Win32\ZAccess.EW is a component of a ZeroAccess (also known as Sirefef or Max++) rootkit infection. Win32\ZAccess.EW attacks are often associated with disabled anti-malware programs and other forms of security hindrances, although the overall consequences of a ZeroAccess infection can extend to other issues – including the potential for irreparable damage to operating system files. Because SpywareRemove.com malware research team ranks most ZeroAccess-associated PC threats as potential...

Win32:Mutama

Posted: August 8, 2012 | Category: Viruses
Win32:Mutama is a worm that uses Autorun exploits to transfer itself to removable USB drives to infect other PCs. Files that have been known to harbor Win32:Mutama include various types of malicious EXE files and fake JPG files, many of which bear names that are intended to entice PC users from Indonesia, Vietnam or Korea. Symptoms of infection by Win32:Mutama can include poor OS performance and an inability to delete directories that are used to store concealed Win32:Mutama files....

Virus.Win32.DelfInject

Posted: August 8, 2012 | Category: Viruses
Virus.Win32.DelfInject is a semi-generic name for a Trojan that injects its code into system processes to accomplish its functions, which usually involve installing other PC threats. This makes detecting or deleting Virus.Win32.DelfInject difficult without specialized anti-malware software, since, as far as your memory processes are concerned, Virus.Win32.DelfInject appears to be a normal part of your operating system. SpywareRemove.com malware experts also recommend that you keep...

Worm.Win32.Bybz.hot

Posted: August 8, 2012 | Category: Worms
Worm.Win32.Bybz.hot is a computer worm and threat to other systems connected to an infected PC. Worm.Win32.Bybz.hot may spread through removable drives or even infect computers connected to one on the same network. Worm.Win32.Bybz.hot may be safely detected and removed using an antimalware program.

Backdoor:Win32/Bifrose.IQ

Posted: August 7, 2012 | Category: Backdoors
Backdoor:Win32/Bifrose.IQ is a backdoor Trojan that is mainly created to open a back door on the corrupted PC. Backdoor:Win32/Bifrose.IQ allows attackers to gain remote access and control over the affected computer. When [PENDING TROJAN 1] invades the targeted computer system secretly, it steals its victim's personal information. Backdoor:Win32/Bifrose.IQ may also steal money from PC users who make online transactions. Backdoor:Win32/Bifrose.IQ can also download and install additional malware...

VirTool:Win32/Injector.gen!CB

Posted: August 7, 2012 | Category: Trojans
VirTool:Win32/Injector.gen!CB is a Trojan that secretly downloads and installs other arbitrary files without a PC user's permission. VirTool:Win32/Injector.gen!CB makes system changes that indicate its presence on the compromised PC. VirTool:Win32/Injector.gen!CB also modifies the Windows registry so that it can run each time you start Windows. VirTool:Win32/Injector.gen!CB is installed by other malware threats. VirTool:Win32/Injector.gen!CB may contact a remote server to download its updates.

Backdoor.Win32.Xtreme.azc

Posted: August 7, 2012 | Category: Backdoors
Backdoor.Win32.Xtreme.azc is a backdoor Trojan that makes your computer system vulnerable and, thus, exposes it to other malware infections. Backdoor.Win32.Xtreme.azc opens a back door on the infected computer which allows attackers to gain access and control over the affected PC. Backdoor.Win32.Xtreme.azc can read your email and phone book information. Backdoor.Win32.Xtreme.azc can also steal your personal information and use it for illegitimate activities.

Trojan.Win32.Tracur

Posted: August 7, 2012 | Category: Trojans
Trojan.Win32.Tracur is a Trojan, which can destroy the affected Windows computer and steal personal information from its victims with the aim of profiting and distributing its malicious files. Trojan.Win32.Tracur can remove your administrative privileges, involve your name into illegitimate activities and slow down your computer system. Trojan.Win32.Tracur does not have an interface and, thus, stays hidden from detection of anti-virus programs. All of malicious files of Trojan.Win32.Tracur...

Trojan.Comine.D

Posted: August 6, 2012 | Category: Trojans
Trojan.Comine.D is a dangerous Trojan that has the ability to port or install other malware threats onto an infected system. Trojan.Comine.D may hide on random executable files making it nearly impossible to manually remove. Installation of Trojan.Comine.D usually takes place under the radar where PC users do not know what has taken place. Removing Trojan.Comine.D may be done with an automatic removal tool such as an updated antimalware program.

Trojan.Downloader.Karagany.L

Posted: August 6, 2012 | Category: Trojans
Trojan.Downloader.Karagany.L is a pesky Trojan horse that could bring some unwanted issues to an infected PC. Trojan.Downloader.Karagany.L could allow remote attackers access where they may be able to obtain personal data stored on the infected PC. Additionally, Trojan.Downloader.Karagany.L is able to modify registry entries and load unwanted processes. Eliminating the threat of Trojan.Downloader.Karagany.L is suggested to be performed with an antispyware program.

Trojan.Sirefef.N

Posted: August 6, 2012 | Category: Trojans
Trojan.Sirefef.N (Trojan:WinNT/Sirefef.N) is a rootkit Trojan that restricts attacked web users from normal Internet surfing by modifying search results and using the pay-per-click technique to earn money for cybercriminals. Trojan.Sirefef.N downloads updates and additional components and disguises existing components on the infected computer. Trojan.Sirefef.N uses advanced stealthy techniques in an attempt to evade detection and removal from the affected computer. Trojan.Sirefef.N uses...

Trojan.Tobfy.A

Posted: August 6, 2012 | Category: Trojans
Trojan:Win32/Tobfy.A is a Trojan that is used to distribute a Police Central e-crime Unit (PCEU) Ransomware to vulnerable computers. Trojan:Win32/Tobfy.A blocks affected PC users from accessing the desktop by displaying a certain image/pop-up alert. The image includes falsified instructions and tricky information about a ransom that you are demanded to pay via Ukash, Paysafecard, Green Dot MoneyPak or Ultimate Game Card to restore access to the computer. The pop-up notification uses the...

Troj/ZAccInf-B

Posted: August 6, 2012 | Category: Trojans
Troj/ZAccInf-B is a computer Trojan that could infect files and corrupt the ability for an infected system to operate normally. Troj/ZAccInf-B acts somewhat like a rootkit where it goes undetected and does not allow the installation of applications such an antimalware program. Troj/ZAccInf-B could block access to certain parts of a system and cause the computer to crash. It is very important to utilize an advanced antimalware tool to safely detect and remove all malware files associated with...

Windows Anytime Upgrade Trojan Ransomware

Posted: August 6, 2012 | Category: Ransomware
Windows Anytime Upgrade Trojan Ransomware Windows Anytime Upgrade Trojan Ransomware is a dangerous ransom message that may lock up a system and hold it for a 100 pound or $100 ransom. Usually the Windows Anytime Upgrade Trojan Ransomware message comes about as a Windows update notification but explains to the user that their system is blocked due to an unregistered program. Eliminating the Windows Anytime Upgrade Trojan Ransomware message usually requires the use of an advanced antimalware application to safely detect and remove all...

Rootkit.Boot.Pihar.c

Posted: August 6, 2012 | Category: Rootkits
Rootkit.Boot.Pihar.c is a dangerous Rootkit that may load during startup of Windows where it could run undetected. When loaded, Rootkit.Boot.Pihar.c could cause a system to crash or freeze occasionally. Moreover, Rootkit.Boot.Pihar.c may put stored data at risk from a connection to a remote attacker. It is important to detect and remove all instances of Rootkit.Boot.Pihar.c files from an infected PC.

Malware Attacking Java CVE-2012-1723 Flaw Increases to Unprecedented Volumes

Posted: August 3, 2012 | Category: Malware News
Hackers have taken to their roots to do what they do best in a recent attack on a Java CVE-2012-1723 flaw. A vulnerability within the Java CVE-2012-1723 was patched by Oracle almost two months ago to put an end to a remote pre-authentication flaw in the Java Runtime environment. Not giving the patch enough time to reach vulnerable computers, hackers have made it their business to get a jump on exploiting this very flaw potentially allowing them to execute arbitrary code on the target system....