Cridex-B is a worm that may attempt to steal financial information and other forms of personal data, as well as being configurable for other attacks and having the standard self-copying functions that all worms possess. Although Cridex-B has been noted for being delivered by several types of PC threats, SpywareRemove.com malware experts have found that recent Cridex-B attacks have been caused by a string of fake invoice spam that link to sites that use various exploits in conjunction to install Cridex-B. Wariness around unusual links from suspicious e-mail messages can help you to avoid a potential Cridex-B attack, which may be disguised to look like harmless content or be accomplished through invisible script exploits. If you do suspect that Cridex-B could be on your PC, you should use appropriate anti-malware programs to confirm or debunk Cridex-B’s presence, since failing to remove Cridex-B with competent anti-malware software can result in both a serious security danger for your computer and theft of your personal information.
How Paying Attention to Your E-mail Can Save You from Cridex-B
Cridex-B-installing attacks have been known to use Trojan downloaders like TrojanDownloader:Win32/Skidlo.A, as well as scripted exploits like Exploit:JS/Blacole. Using strong browser security settings, disabling scripts, keeping select scripts uninstalled and having active anti-malware programs can all help to identify and defend against these types of Cridex-B-installation attacks.
As of late January, the number of Cridex-B infections that have been identified in these attacks number only a hundred, but with that quantity slowly growing, SpywareRemove.com malware experts advise that you pay attention to unusual e-mail links. As long as you use an up-to-date web browser, use strong security settings and keep an anti-malware product on hand, however, you should be likely to detect these encroachments before they can finish installing Cridex-B on your PC. If this isn’t the case, though, you should consider taking extra steps to secure your bank-related information, since Cridex-B has been known to steal bank passwords and other forms of sensitive and fiscal information, especially info that Cridex-B can glean from your web browser.
Cridex-B – Possibly Just the Initial Step in a Ladder of Computer Woes
Besides its spyware tendencies, Cridex-B is also noted for the following functions, although any specific Cridex-B infection can or cannot use a few or all of these attacks (due to the inherent variability that Cridex-B’s remote server instructions allow):
- Copying itself to removable hard drives or network-shared locations that Cridex-B may use to install itself onto other computers.
- Infection techniques that allow Cridex-B to insert malicious code into normal Windows processes; this will make removing Cridex-B more difficult than it normally would be.
- Changes to your Registry that force Internet Explorer to start in Online Mode. SpywareRemove.com malware researchers note that this can be classified as a security risk.
- Contacting a remote server to acquire instructions, download other malware for installation or send stolen information to criminals.
SHeur4.SJJ [AVG]W32/Yakes.B!tr [Fortinet]Trojan.Agent/Gen-Falint[Cont] [SUPERAntiSpyware]Trojan/Win32.Dapato.gen [Antiy-AVL]Troj/Zbot-BNJ [Sophos]Worm/Cridex.B.79 [AntiVir]Win32.HLLW.Autoruner1.11771 [DrWeb]Trojan.Generic.KD.547797 [BitDefender]Trojan-Dropper.Win32.Dapato.aeuk [Kaspersky]TROJ_GEN.R3EC7C1 [TrendMicro-HouseCall]
More aliases (336)
Cridex.B Automatic Detection Tool (Recommended)
Is your PC infected with Cridex.B? To safely & quickly detect Cridex.B, we highly recommend you run the malware scanner listed below.
Download SpyHunter's* Malware Scanner to detect Cridex.B What happens if Cridex.B does not let you open SpyHunter or blocks the Internet?
File System Modifications
Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.
- The following files were created in the system:
Posted: November 4, 2011 | By SpywareRemove
Threat Level: 5/10
Rate this article:
Detection Count: 508