Trojan.Gen.2 is not just one but many different kinds of Trojan infections that vary widely in their methods of attack and the damage they can cause. In most cases, Trojan.Gen.2 Trojans are downloaded unintentionally and proceed to infect new computers through network and removable hard drive exploits. Trojan.Gen.2 Trojans may download more malware onto a system, enable a remote attacker to control your computer, or perform covert spying activities. Deleting Trojan.Gen.2 when you see a variation on this infection is necessary to maintain a basic level of system health and should be done before the infection has a chance to slink onto a new host.
Protecting Yourself from This Pervasive Trojan
Trojans under the broad type of Trojan.Gen.2 are still fairly ‘popular’ among hackers despite having been detected as a confirmed threat at least as early as 2008. This is because they’re quite adept at infecting new machines – a Trojan.Gen.2 infection can use both networks and removable hard drives (such as USB thumb drives) to infect a new system easily. This is done through an Autorun exploit that allows the Trojan.Gen.2 Trojan to infection a system without giving any obvious visual signs.
Avoiding using networks or removable hard drive devices is the easy way out, but it will not completely protect you. Trojan.Gen.2 malware can also infect computers through downloaded files or even nearly invisible code injections on malicious websites. The best recourse is to keep anti-malware programs running 24/7, while making sure their databases are up to date to catch the latest Trojan.Gen.2 variation. If you do this as well as practice generally safe web browsing habits, your computer should be safe in almost all circumstances.
The Tally of Trojan.Gen.2 Attacks
Although there is a broad range of attacks Trojan.Gen.2 can mutilate your poor computer with, some possibilities are far more common than others.
- Contact with outside third parties is highly likely when you have a Trojan.Gen.2 infection. The variety of problems from this point forward is limited more or less solely by the restrictions of technology and the ingenuity of the hacker. Total destruction of or loss of control over a system are far from unheard of, although in many cases the worst thing a remote attacker can do is simply upload spyware and quietly steal all your passwords and other sensitive data.
- Downloading external files onto your computer and executing them, almost always to the detriment of the host system. Trojan.Gen.2 may do this to serve as an entry mechanism for rogue security products and other misleading but obvious malware programs, or Trojan.Gen.2 may use subtler but no less damaging kinds of malware. When left alone for sufficient periods of time, most forms of malware will inevitably damage your computer to the point of a complete system wipe being required to have basic functionality restored.
- Changing your registry to allow malware to start automatically with Windows. In many cases, such as with the Trojan.Gen.2 infection itself, this process will not be visually obvious. Task Manager will usually detect such processes, but in some cases the Trojan.Gen.2 Trojan will disable Task Manager, leaving you struggling to find a way to see what the problem is!
- Particularly sophisticated versions of Trojan.Gen.2 may even detect outdated copies of themselves and apply updates. This will naturally make it harder for you to detect and delete Trojan.Gen.2 permanently.
Since these Trojans can cause so many different kinds of damage, one should play it safe and delete Trojan.Gen.2 sooner rather than later. The potential cost to your system if you’re lax on beating this infection back could be quite high!
Trojan.Gen.2 Automatic Detection Tool (Recommended)
Is your PC infected with Trojan.Gen.2? To safely & quickly detect Trojan.Gen.2, we highly recommend you run the malware scanner listed below.
Download SpyHunter's* Malware Scanner to detect Trojan.Gen.2 What happens if Trojan.Gen.2 does not let you open SpyHunter or blocks the Internet?
File System Modifications
- The following files were created in the system:
# File Name 1 %System%\arking.exe 2 %System%\arking0.dll 3 %System%\arking1.dll 4 %System%\arking2.dll
- The following newly produced Registry Values are:
Posted: February 21, 2011 | By SpywareRemove
Threat Level: 8/10
Rate this article: