Trojan.BHO.btgg
Posted: January 4, 2012
Threat Metric
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
Threat Level: | 9/10 |
---|---|
Infected PCs: | 9 |
First Seen: | January 4, 2012 |
---|---|
Last Seen: | October 18, 2020 |
OS(es) Affected: | Windows |
Trojan.BHO.btgg is a Trojan that exploits Adobe Acrobat vulnerabilities to allow malicious code to be loaded. This can be utilized to compromise your computer's security or install other PC threats (such as Trojans, worms, spyware or scamware). Since SpywareRemove.com malware researchers have found that Trojan.BHO.btgg is primarily-propagated by mass-mailed messages in the form of a 'BriefintroductionofKim-Jong-il.pdf' file attachment, you should avoid files that present themselves in a similar fashion, and be cautious about file attachments from unusual sources. If Trojan.BHO.btgg has made its way onto your PC, you should scan your entire computer with anti-malware software to be certain of removing, not just Trojan.BHO.btgg, but any PC threats that Trojan.BHO.btgg is likely to have installed.
Why No News is Better Than Trojan.BHO.btgg in Your Mailbox
In the wake of Kim Jong-il's demise, Trojan.BHO.btgg hides in spammed messages that purport to offer news about the North Korean dictator via harmless PDF attachments. Those who are unaware of the vulnerabilities being exploited here (CVE-2010-2883 and CVE-2010-3333, both of which are buffer overflows that allow for the automatic execution of code from a remote source) may think that there's no way a PDF file could damage their PC, but SpywareRemove.com malware experts warn that Trojan.BHO.btgg has just as much potential for harm as any Trojan dropper.
The exploits in question from Trojan.BHO.btgg Trojans affect Adobe Reader and Acrobat 9.x before 9.4, 8.x before 8.2.5 on Windows/Mac OS X, as well as Microsoft Office XP SP3, Office 2003 SP3, Office 2007 SP2, Office 2010, Office 2004/2008 for Mac, Office for Mac 2011 and, finally, Open XML File Format Converter for Mac. If you're not using any of these operating systems or programs, your PC is safe from this method of Trojan.BHO.btgg attack, although other vectors (such as drive-by-download scripts) remain a possibility and should be combated with appropriate security software.
The Toxic Result of Unwrapping Trojan.BHO.btgg
Opening Trojan.BHO.btgg will result in the registration of a malicious .dll file on your PC as well as Trojan.BHO.btgg attempting to make contact with its command server. Trojan.BHO.btgg may also attack your computer's network security (such as your firewall or port settings) during this process, and afterward, Trojan.BHO.btgg is likely to install other types of PC threats.
Since Trojan.BHO.btgg can be used to install multiple types of malicious software, SpywareRemove.com malware experts recommend that you expect some or all of the risks mentioned below after a Trojan.BHO.btgg attack:
- The presence of spyware that records keyboard input, cached information and other forms of personal data to steal passwords, bank account information, et cetera.
- Browser redirect attacks that redirect your web browser to hostile websites or block safe sites.
- The presence of rogue anti-malware products that emit fake warnings and alerts.
- The presence of backdoor Trojans and RATs that allow criminals to manage your computer from a remote location.
Both Trojan.BHO.btgg and its payload can be removed by up-to-date anti-malware products, although inadequately-updated scanners may fail to detect Trojan.BHO.btgg, which, as of January 2011, remains a fairly-new PC threat.
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.