Trojan:Win32/Lodbak.A!lnk
Posted: May 18, 2015
Threat Metric
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
Threat Level: | 9/10 |
---|---|
Infected PCs: | 1 |
First Seen: | May 18, 2015 |
---|---|
Last Seen: | January 25, 2020 |
OS(es) Affected: | Windows |
Trojan:Win32/Lodbak.A!lnk is a detection name utilized by anti-malware scanners to name a Trojan infection. Customarily, Trojans such as Trojan:Win32/Lodbak.A!lnk is a Trojan and worm that distributes itself through USB devices, and may take steps to disable your PC's security settings. Because Trojan:Win32/Lodbak.A!lnk's confirmed functions may be part of the early stages of additional attacks, you also should be mindful of the potential for their enabling the collection of information or the installation of other threats. Alerts from your anti-malware products are the primary symptoms of Trojan:Win32/Lodbak.A!lnk infections – and removing Trojan:Win32/Lodbak.A!lnk from an infected hard drive should be viable with those same products.
Trojan:Win32/Lodbak.A!lnk: The Portable File Concealer
Trojan:Win32/Lodbak.A!lnk is threatening software associated with recent attacks against both residents of Thailand and English-speaking PC users. Malware experts only saw Trojan:Win32/Lodbak.A!lnk being distributed in the past year, but its definitive features conform to the standards of previous worms like the Dorkbot family. Trojan:Win32/Lodbak.A!lnk may distribute itself by being installed automatically on USB devices, and then installing itself on new machines that access the infected device automatically.
Trojan:Win32/Lodbak.A!lnk may hide its installation with multiple, automatic changes to your system settings. The Show Hidden Files option is disabled, and the PC's Windows system protection feature also is blocked. These changes let Trojan:Win32/Lodbak.A!lnk Trojans conceal their files on any infected drive, as well as hide other, third-party files.
By default, Trojan:Win32/Lodbak.A!lnk may hide all files on an infected USB drive, making the contents of the drive appear empty. However, victims of Trojan:Win32/Lodbak.A!lnk's attacks may right-click the drive and use the Properties tab (or use the Command Prompt) to confirm that the contents of the drive still are intact, albeit hidden.
Stopping a Worm from Growing Back
Although containment is a priority for any threat attack, preventing worms like Trojan:Win32/Lodbak.A!lnk from reinstalling themselves is especially critical to any PC user's security. Avoid sharing out removable devices that have been contaminated by Trojan:Win32/Lodbak.A!lnk until you've removed Trojan:Win32/Lodbak.A!lnk with an appropriate anti-malware product. Malware researchers have seen some cases of Trojan:Win32/Lodbak.A!lnk Trojans being able to persist through a simple HD reformat that would wipe all benign files. Deleting Trojan:Win32/Lodbak.A!lnk's visible file is unlikely to be a permanent solution.
Since Trojan:Win32/Lodbak.A!lnk may undertake behavior highly conducive to future attacks carried out by other threat, you also may see new symptoms not described in this article. A Command & Control server may instruct Trojan:Win32/Lodbak.A!lnk to take new actions, and Trojan:Win32/Lodbak.A!lnk may install threats with independent, specialized features. As a guideline, malware researchers would assume that any Trojan:Win32/Lodbak.A!lnk infection has the potential to lead to attacks that could collect passwords or generate additional security issues that necessitate extra precautions.
Trojan:Win32/Lodbak.A!lnk has been seen installing itself to new PCs and removable devices, but malware researchers have yet to confirm incidents of Trojan:Win32/Lodbak.A!lnk Trojans creating multiple duplicates of themselves on the same hard drives. However, any anti-malware scans for uninstalling Trojan:Win32/Lodbak.A!lnk should continue until all results are clean, regardless.
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.