Beebone Description

Beebone is a family of Trojan downloaders that install a variety of PC threats without your permission. A normal Beebone attack will involve its own installation – either in a concealed manner or under a disguise that makes Beebone look like a benevolent application. Attacks linked to Beebone’s variable payloads can include Bitcoin mining, browser hijacks, disabled PC security features, hijacked accounts related to social media sites and/or the additional distribution of malware through external hard drives (such as USB drives). Because Beebone can install many types of malware and will attempt to avoid being deleted, you should use anti-malware utilities as they’re required to delete Beebone along with the other Trojans, worms or viruses that Beebone is undoubtedly eager to nail onto your hard drive.

The Basic Bones About Beebone’s Badware Business

While Beebone includes many variants that display some slight differences in behavior, overall, Beebone always is used to install other types of hostile software in secret. In rare circumstances, these attacks also may include the creation of backdoor vulnerabilities that C&C server-controlling criminals may use to exert a dangerous degree of control over your PC’s files, applications and control input. Some of the most significant Trojans that malware experts have tied to Beebone attacks include:
  • Sirefef Trojans that often are responsible for redirecting your browser’s searches, changing your homepage or abusing your PC’s resources to generate Bitcoin currency.
  • Vobus worms that distribute themselves through peripheral devices and network-shared locations.

    » Learn more about SpyHunter's Spyware Detection Tool
    and steps to uninstall SpyHunter.

    Any uninfected PC’s contact with a Vobus-infected device or network location may result in that PC also becoming infected.
  • Acbot Trojans that hijack your social media accounts (Facebook, Twitter, etc) and use them to post malicious messages.

How to Catch Beebone Before It Spins a Web of Trojans Around Your Computer

Beebone doesn’t display any visible symptoms during its attacks, and malware experts recommend that you use anti-malware applications to detect Beebone. Avoidance of suspicious links, potentially dangerous sites, unusual application installers and/or unsafe browser settings also can play their part by reducing the chances that your PC will be infected by Beebone in the first place.

Variants of Beebone are inconsistent in where they conceal their files, as well as what file names they use. However, most Beebone family Trojans utilize a basic form of code obfuscation that may confuse basic anti-malware programs. To guarantee as much accuracy and consistency as is possible when trying to uproot Beebone and related PC threats, malware researchers recommend that you make sure that your software is updated, use Safe Mode when applicable, and scan your entire PC with the most powerful scanning options that are available.
Some of the major variants of Beebone include Beebone.gen!A, Beebone.DE, Beebone.DG, Beebone.DO, Beebone.EH and Beebone.EF – all of which are restricted to attacking Windows-based PCs.

Beebone Automatic Detection Tool (Recommended)

Is your PC infected with Beebone? To safely & quickly detect Beebone we highly recommend you run the malware scanner listed below.

Posted: February 13, 2013 | By
Rate this article:
1 Star2 Stars3 Stars4 Stars5 Stars (No Ratings Yet)
Loading ... Loading ...
Threat Metric
Threat Level: 8/10

Leave a Reply

What is 2 + 8 ?
Please leave these two fields as-is:
IMPORTANT! To be able to proceed, you need to solve the following simple math (so we know that you are a human) :-)