Worm/Generic2.ceag

Posted: July 13, 2012 | Category: Worms
Worm/Generic2.ceag is a worm that currently has poor distribution in the wild. Like most worms, Worm/Generic2.ceag has the potential for distributing itself by copying itself to removable drives or network-shared directories, and SpywareRemove.com malware researchers especially recommend that you keep your security intact to monitor these infection vectors. SpywareRemove.com malware research team also notes that recent Worm/Generic2.ceag infection reports are indicative of a potential false...

Trojan.Patchep!sys

Posted: July 13, 2012 | Category: Trojans
Trojan.Patchep!sys is a heuristic detection for PC threats that infect native Windows components to enable the easy execution of other PC threats, such as spyware. Since Trojan.Patchep!sys, like similar Trojans such as Trojan Horse Patched_c.LYT , Trojan horse Patched_c.LZE or Trojan Horse Patched_c.LYU , will most likely be detected as an infection for services.exe, you should never try to delete the 'host' file of a Trojan.Patchep!sys infection due to the mandatory nature of this file...

Red Raider Virus

Posted: July 12, 2012 | Category: Viruses
Red Raider is a virus that spreads on the corporate networks. Red Raider Virus creates a vulnerability on the IIS (Internet Information Server) software. Red Raider Virus enters the targeted PC through a hole in Internet Information Server (IIS) software, which is widely used for powering Internet servers. Then, Red Raider Virus scans the Internet for vulnerable systems to affect them and continue the process.

Love Hurts Virus

Posted: July 12, 2012 | Category: Viruses
Love Hurts is a virus that spreads through the chat messenger system and emails. Love Hurts is able to overwrite numerous files. Love Hurts Virus arrives to your email box with a message 'I Love You'. Love Hurts is dangerous for the Internet Explorer because it modifies the start page. Love Hurts Virus also overwrites .jpg and .gif files and transmits copies through Microsoft Outlook.

Trojan.Mayachok.1

Posted: July 12, 2012 | Category: Trojans
Trojan.Mayachok.1 is a ransomware Trojan that uses fraudulent pretenses to get you to send an SMS message to a mobile service scam. Although Trojan.Mayachok.1 has been observed primarily in Russian webspace, PCs in other areas are also likely to be vulnerable to Trojan.Mayachok.1, which is identifiable by its fake website alerts that include traffic overload warnings and Trojan.Mayachok.1's characteristic SMS-related 'feature.' Since your Internet connectivity may be disabled, or various...

Trojan:Win32/Sirefef.AL

Posted: July 12, 2012 | Category: Trojans
Trojan:Win32/Sirefef.AL is a Trojan that represents the Sirefef malware family and encompasses rootkit functionalities. Trojan:Win32/Sirefef.AL can change DNS settings in order to change your queries in search engines on the targeted web browser and redirect you to suspicious advertising websites designed by scammers. Trojan:Win32/Sirefef.AL might be difficult to detect and uninstall from the corrupted machine by many security applications.

Win32/Sirefef.AN

Posted: July 12, 2012 | Category: Trojans
Win32/Sirefef.AN is a Trojan that contains ZeroAccess rootkit capabilities and, thus, is difficult to detect and remove by many security tools. Win32/Sirefef.AN hides its components in certain locations on the affected computer system in order to evade detection and removal by security software. Win32/Sirefef.AN tuns off numerous system services to assure its payload's execution. Win32/Sirefef.AN can completely damage the targeted machine.

Nginx Virus

Posted: July 11, 2012 | Category: Viruses
Nginx Virus The Nginx Virus is a casual name for a browser hijacker that blocks popular websites to display a Nginx server-based site instead of your normal content. Since Nginx is a popular open source program that can be used by both malicious and benevolent websites, SpywareRemove.com malware researchers recommend that you assume that your PC may have been exposed to potential browser-based attacks after contact with sites that resemble the end results of a Nginx Virus's hijack. In some cases, what...

Mal/Katusha-F

Posted: July 11, 2012 | Category: Trojans
Mal/Katusha-F is an e-mail-distributed member of the Trojan.Katusha family, and, like all Katusha-based Trojans, can be involved in attacks against your computer's security or attempts to install other PC threats. Several variants of Mal/Katusha-F's favorite e-mail template have been observed so far, and SpywareRemove.com malware researchers warn against downloading any file attachments that claim to be confirmation of an airline seating reservation (Mal/Katusha-F's preferred scam)....

Mal/Krap-D

Posted: July 11, 2012 | Category: Mac Malware, Trojans
Mal/Krap-D is a backdoor Trojan that's designed for the Windows operating system, although the attack method that installs Mal/Krap-D also includes cross-platform compatibility by pairing Mal/Krap-D with the option to install an OS X or Linux-compatible Trojan instead of Mal/Krap-D. Like all backdoor Trojans, Mal/Krap-D compromises your computer's security and should be considered a high-level PC threat to be removed by a reliable anti-malware product, although symptoms of Mal/Krap-D's...

Troj/JavaDl-NJ

Posted: July 11, 2012 | Category: Trojans
Troj/JavaDl-NJ is a Java-based applet that's used to install one of three types of backdoor Trojans, with the type of Trojan being based on your operating system. Troj/JavaDl-NJ, also known by the alias Trojan-Downloader:Java/GetShell.A, has only been seen in one site that has since been shut down. However, since this site was a benign website that was hacked to include Troj/JavaDl-NJ, rather than an intentional host for Troj/JavaDl-NJ attacks, SpywareRemove.com malware researchers rate the...

Trojan.Sirefef.Ga

Posted: July 11, 2012 | Category: Trojans
Trojan.Sirefef.Ga is a component of a Sirefef or ZeroAccess rootkit infection, and, as such, is merely a single finger of an entire fist's worth of malicious software that can be attacking your PC. SpywareRemove.com malware researchers have seen PC threats from Trojan.Sirefef.Ga's family engaged in browser hijacks (similar to DNS Changer), Bitcoin currency fraud, theft of confidential information and direct attacks against multiple kinds of security software. Although infections related to...

W32.Morto.B

Posted: July 11, 2012 | Category: Worms
W32.Morto.B is a worm that circulates through removable drives and by using Remote Desktop Protocol (RDP) connections. W32.Morto.B attempts to open the Remote Desktop Protocol (RDP) connection on PCs in the local network by using common user name and password combinations. W32.Morto.B also affects executable files detected on the infected computer. Once executed, W32.Morto.B inserts itself into the svchost.exe service. W32.Morto.B may also affect other executable files on the targeted PC....

Backdoor:W32/GetShell.A

Posted: July 10, 2012 | Category: Backdoors
Backdoor:W32/GetShell.A is the Windows-specific payload of Trojan-Downloader:Java/GetShell.A, a malicious Java applet that detects your OS and installs an 'appropriate' type of backdoor Trojan. Backdoor:W32/GetShell.A is responsible for the same dangers that are common to most backdoor Trojans, including opening up your PC to unwanted control by third parties, disabling or reducing your computer's security features and, potentially, downloading additional PC threats or stealing private...

Trojan-Downloader:Java/GetShell.A

Posted: July 10, 2012 | Category: Trojans
Just as you'd expect from its name, Trojan-Downloader:Java/GetShell.A is a JavaScript-based Trojan downloader that installs other PC threats (specifically, one of several backdoor Trojans, depending on the victim's operating system). At the time of this article's writing, SpywareRemove.com malware researchers have currently only seen Trojan-Downloader:Java/GetShell.A on a single hacked website for Colombia-based transportation, although Trojan-Downloader:Java/GetShell.A may also be seen on...

Backdoor.Proxybox

Posted: July 10, 2012 | Category: Backdoors
Backdoor.Proxybox is a backdoor Trojan that's used to facilitate illegal proxy server botnets. These botnets are rented out to other criminals, which makes the potential attacks linked to Backdoor.Proxybox literally only restricted by the money and creativity of Backdoor.Proxybox's customers. SpywareRemove.com malware researchers have found indications of Backdoor.Proxybox having tens of thousands of bots available at the time of this article's writing – although Backdoor.Proxybox may include...

Trojan Horse Patched_c LYT

Posted: July 10, 2012 | Category: Trojans
Trojan Horse Patched_c.LYT is a Trojan horse that attaches itself to the Services Control Manager – a Windows component that manages the termination and launching of programs. This methodology is reminiscent of similar PC threats like Trojan Horse Patched_c.LYU and Trojan horse Patched_c.LZE , and like them, Trojan Horse Patched_c.LYT may trigger persistent warning messages from anti-malware and security software. Any Trojan Horse Patched_c.LYT infection should be seen as a high-level...

Trojan Horse Patched_c LYU

Posted: July 10, 2012 | Category: Trojans
Similar to Trojan Horse Patched_c.LYT or Trojan horse Patched_c.LZE , Trojan Horse Patched_c.LYU is a Trojan that infects native Windows components such as services.exe. Symptoms of Trojan Horse Patched_c.LYU infections can include a disabled UAC, malicious browser pop-ups and, in extreme cases, completely disabled Internet access. Trojan Horse Patched_c.LYU infections have been distributed as of this month via fraudulent pop-up windows and SpywareRemove.com malware researchers especially...

Nexplore

Posted: July 10, 2012 | Category: Browser Hijackers
Nexplore is a browser hijacker that's named after the same site that Nexplore promotes, the search engine Nexplore.com. Symptoms that are especially common for Nexplore-infected computers include pop-up alerts that advertise fake security software, blockades set up against real security programs, a slowdown of web-browsing activities and online searches that redirect to Nexplore.com without your permission. Nexplore browser hijackers are likely to be installed with other PC threats that may...

Troj/Invo-Zip

Posted: July 9, 2012 | Category: Trojans
Troj/Invo-Zip is a Trojan that is included in a spam email message sent as a supposed report for 'tomorrow's meeting'. The fake email tells you not to forget to bring a report to a meeting being held tomorrow. The unsolicited email has a subject line 'Don't forget about a meeting tomorrow' and contains a malicious file called 'Report.zip', which is detected as Troj/Invo-Zip. The spelling of the bogus email message body can differ, most likely in a try to evade rudimentary email filters which...