Report: Over a Third of Android Apps are Infected with Malware

Posted: July 30, 2012 | Category: Malware News
Ownership of an Android OS device has brought about some new consequences in knowing that about a third of available apps have malware. In the race to be the ultimate smartphone and tablet operating system with over 400 million active users, the Android OS has taken a major blow in a new report released by security firm BT determining that about one-third of Android-based apps have malware. BT made these remarks during a NetEvents Americas conference where they set-out to find more...

Boxore adware

Posted: July 30, 2012 | Category: Adware
Boxore adware is an adware application that displays pop-up error messages and ads on the affected PC. Boxore adware infiltrates into the infected computer system via free movies sharing websites. Boxore adware can also drop other malware threats on the corrupted machine. To watch the movies, you will be asked to download either plugin or video player, particularly a free multimedia player called Player Plus. Once you installed the plugin and player, Boxore adware is also installed on your...

Troj/Agent-XES

Posted: July 30, 2012 | Category: Trojans
Troj/Agent-XES is a Trojan that propagates via a spam Blackhole malware campaign on Twitter. Spam messages on Twitter that distribute Troj/Agent-XES use the wording of 'It's you on photo?' and 'It's about you?'. An instance of the deceptive tweets is '@[Username] It's you on photo? [Domain]/#[Username].html'. Dangerous links on Twitter declare that you are pictured in an online photo. The accounts that are distributing the fake messages have either been corrupted by web attackers or have been...

Troj/JSRedir-HY

Posted: July 30, 2012 | Category: Trojans
Troj/JSRedir-HY is a JavaScript Trojan that is included in a Blackhole malware attack, which spreads on Twitter using 'It's you on photo?' trickery. However, versions of the malicious spam attack using the wording 'It's about you?' have also been spotted on Twitter. An example of the dangerous tweets is '@[Username] It's you on photo? [Domain]/#[Username].html'. Malicious links on Twitter state that you are pictured in an online photo. The accounts that are spreading the messages have either...

Trojan.DL.Banload.WOG

Posted: July 30, 2012 | Category: Trojans
Trojan.DL.Banload.WOG is a Trojan that slows the affected PC. Trojan.DL.Banload.WOG infects targeted computers with numerous folders. Trojan.DL.Banload.WOG also creates a hidden channel for communication with a remote server. Trojan.DL.Banload.WOG receives the commands for malicious actions through a remote server. Trojan.DL.Banload.WOG can also be used to spread rogue security applications.

Trojan.Claretore

Posted: July 30, 2012 | Category: Trojans
Trojan.Claretore is a computer Trojan horse that may redirect PC users to unwanted websites, potentially spreading malware. Trojan.Claretore usually installs in a stealthy manor and load at startup of Windows. Once installed, Trojan.Claretore could open up a port where a remote hacker could access the infected system and steal personal information. It is best to eliminate the Trojan.Claretore threat with an antimalware program.

TrojanSpy:Win64/Ursnif.C

Posted: July 30, 2012 | Category: Trojans
TrojanSpy:Win64/Ursnif.C is a dangerous Trojan horse that could capture passwords and personal data on an infected PC. TrojanSpy:Win64/Ursnif.C may also be used by a remote hacker to gain access to the computer. TrojanSpy:Win64/Ursnif.C may be extremely difficult to manually remove due to it having rootkit capabilities and loading at startup of Windows. It may be beneficial to remove TrojanSpy:Win64/Ursnif.C using an antimalware program.

Trojan:AutoIt/Ransom.F

Posted: July 30, 2012 | Category: Trojans
Trojan:AutoIt/Ransom.F is a Trojan that is a part of ransomware. Trojan:AutoIt/Ransom.F displays a fake pop-up alert in an attempt to scare PC users they have committed a certain crime. Trojan:AutoIt/Ransom.F can lock the targeted computer or screen, and then demand the ransom from victims for certain violated laws. Trojan:AutoIt/Ransom.F also connects to a remote website over the Internet and then downloads other security threats onto the affected computer. Trojan:AutoIt/Ransom.F can also...

BackDoor.DaVinci.1

Posted: July 27, 2012 | Category: Backdoors
BackDoor.DaVinci.1 is a backdoor Trojan and rootkit that's newsworthy for the power of its modular design, as well as its cross-platform compatibility with Windows, Mac OS X and several mobile device-specific operating systems. Dubbed by its creators as a 'weapon for the 21st century,' BackDoor.DaVinci.1 grants criminals complete access to the infected PC and can be used for subtle attacks, such as theft of personal information, as well as extremely obvious and damaging attacks that render...

W32.Stikpid

Posted: July 27, 2012 | Category: Worms
W32.Stikpid is a worm that circulates through removable drives. W32.Stikpid also drops potentially infected files, steals computer system information, and opens a back door on the affected PC. W32.Stikpid may spread via malicious email attachments, hijacked removable drives, drive-by downloads, or can be dropped by other malware infections. Once executed, W32.Stikpid may replicate itself to the certain locations. W32.Stikpid may create the certain registry entries so that it can run...

Backdoor.Finfish

Posted: July 27, 2012 | Category: Backdoors
Backdoor.Finfish is a backdoor Trojan that opens a back door on the infected computer. Once executed, Backdoor.Finfish may create numerous malicious files. Backdoor.Finfish also creates several registry entries. Backdoor.Finfish may then connect to the particular command-and-control (C&C) servers. Backdoor.Finfish may then transmit stolen information to remote locations.

Troj/Redir-P

Posted: July 27, 2012 | Category: Trojans
Troj/Redir-P is a Trojan that attempts to redirect your browser to a site with confirmed malicious content for downloading PC threats onto your computer without your consent. Troj/Redir-P is distributed by e-mail spam campaigns that target Germany-based e-mail accounts (by targeting the .de domain suffix); these e-mails include German messages about supposed photo attachments that, when opened, turn out to be Troj/Redir-P. Identifying and deleting Troj/Redir-P-related e-mail messages should...

Imbot.AC Worm

Posted: July 27, 2012 | Category: Worms
Imbot.AC is a worm that affects computer systems via MSN Messenger by sending itself as attachement to contacts from the compromised PC and displaying certain messages. You should not respond to such messages in your MSN window to protect your computer from being infected with Imbot.AC. Imbot.AC connects itself to the Internet and disguises itself from the affected PC user.

TDSServ

Posted: July 26, 2012 | Category: Trojans
TDSServ is a Trojan that installs itself onto the affected computer system through vulnerabilities in already installed programs, mainly InternetExplorer, or by using rogue anti-spyware applications. TDSServ uses rootkit techniques created by attackers to disguise its existence in the infected computer system. TDSServ is difficult to detect and uninstall by many security programs. Once installed, TDSServ will be configured to run automatically every time you start Windows. While running,...

Troj/PDFEx-GD

Posted: July 26, 2012 | Category: Trojans
Troj/PDFEx-GD is a Trojan that is involved in a spammed-out malware campaign. Troj/PDFEx-GD spreads via spam NYC Traffic Ticket email messages. Spam emails attempt to trick PC users into believing that they were caught speeding by the New York State Police, and are now being charged with a traffic attack has a subject line 'NYC Traffic Ticket [id number]'. The unsolicited email contains a link which takes recipients to a website including the Blackhole exploit kit. If the recipient visits the...

Downloader.Agent2.BDGM

Posted: July 26, 2012 | Category: Trojans
Downloader.Agent2.BDGM is a Trojan program that installs itself on the targeted computer through web browser exploits or comes bundled with other PC threats. Once installed on the compromised PC, Downloader.Agent2.BDGM will download and install additional malware infections and may display warning messages. Downloader.Agent2.BDGM may be difficult to find and delete from the infected computer by many security tools. Downloader.Agent2.BDGM can spread via pornographic websites, spam email...

Trojan.Vicenor

Posted: July 26, 2012 | Category: Trojans
Trojan.Vicenor is a Trojan that masquerades as a helpful software program. Trojan.Vicenor can access the affected computer stealthily without the victim's consent and knowledge. Trojan.Vicenor can drop infected files and modify the Registry by adding certain registry entries. Trojan.Vicenor can gather personal information and computer data. Trojan.Vicenor can then forward the collected information to remote attackers. [TROJAN] can use the stolen data for malicious purpose. Trojan.Vicenor can...

TR/Barys.EB.34

Posted: July 25, 2012 | Category: Trojans
TR/Barys.EB.34 is a Trojan downloader that installs other forms of harmful software without your permission and is distributed as a file attachment in Germany-targeting spam e-mail. TR/Barys.EB.34's recent campaign of mass-mailed e-mail (as of late July 2012) claims that a postal delivery has failed and that additional information is included in an attached .zip archive. SpywareRemove.com malware analysts have also confirmed that PC threats related to TR/Barys.EB.34 often include spyware or...

Troj/Agent-XDD

Posted: July 25, 2012 | Category: Trojans
Troj/Agent-XDD is a Trojan that distributes itself through spam e-mail messages that pretend that Troj/Agent-XDD is benign content – in this specific case, by portraying Troj/Agent-XDD as a printer-scanned image. Although Troj/Agent-XDD's business-oriented hoax is a more believable hook than the spam hoaxed used by similar PC threats like Mal/ExpJS-AA , Win32/Cbeplay.P , Win32.Worm.Mytob.C@mm , Trojan.Win32.Buzus.cyms , Cridex-B or Troj/JSRedir-EX , the consequences are just as...

Trojan horse Patched_c.LZI

Posted: July 24, 2012 | Category: Trojans
Trojan horse Patched_c.LZI is a Trojan that usually hides itself in the Windows directory in the process called services.exe, which allows it to avoid removal by many security tools. Security programs cannot completely remove Trojan horse Patched_c.LZI stating that the extermination might result in system errors because of the damage of system files caused from extraction of the malicious code from white-listed area. Trojan horse Patched_c.LZI connects to a remote server to get its payload....