FakeAIM 1.0

Posted: March 28, 2006 | Category: Trojans
This spyware was created for stealing AIM passwords. The interface of this trojan is just like one of the AIM messengers, that's why it’s sometimes hard to feel the difference and enter a password into a special form. FakeAIM saves all the passwords in a special log file, which is always available to the hacker. The following files were created in the system:

Remotecmd 1.0

Posted: March 28, 2006 | Category: Remote Administration Tools
A Remote Administration Tool is a special kind of hacker malware, used for remote access and control of other people's PCs. The attacker infects the PC via the e-mail or File and Print Sharing. A "server" allows him to connect via a "client" on his own machine. The functions of a RAT may vary, depending on the needs of the hacker. Some RATs can't really harm your PC and the only purpose they were made for is hooliganism. But some versions can steal vital information, remove files and even...

RemoteCtrol 1.1

Posted: March 28, 2006 | Category: Remote Administration Tools
A Remote Administration Tool is a special kind of hacker malware, used for remote access and control of other people's PCs. The attacker infects the PC via the e-mail or File and Print Sharing. A "server" allows him to connect via a "client" on his own machine. The functions of a RAT may vary, depending on the needs of the hacker. Some RATs can't really harm your PC and the only purpose they were made for is hooliganism. But some versions can steal vital information, remove files and even...

RemoteHome2000

Posted: March 28, 2006 | Category: Remote Administration Tools
RemoteHome2000 is a remote administration tool based on the server and client technology. It allows the attacker to control your PC, access all your documents and sensitive data, manage the computer, install and run applications, remove files and much more. Although RemoteHome2000 is not a real spyware, its presence on your PC definitely is high security and privacy risk.

RemoteProcessLaunch

Posted: March 28, 2006 | Category: Remote Administration Tools
A Remote Administration Tool is a special kind of hacker malware, used for remote access and control of other people's PCs. The attacker infects the PC via the e-mail or File and Print Sharing. A "server" allows him to connect via a "client" on his own machine. It opens a default TCP port and awaits commands from the intruder. The functions of a RAT may vary, depending on the needs of the hacker. Some RATs can't really harm your PC and the only purpose they were made for is hooliganism. But...

FakeGINA Trojan

Posted: March 28, 2006 | Category: Trojans
This spyware was created for stealing many Windows logon information. When a user enters correct username and password on the Logon screen, this trojan writes this information into a special log-file. The hacker then is able to access that file at any time. The following files were created in the system:

Fancy Trojan

Posted: March 28, 2006 | Category: Trojans
This trojan usually tries to sneak into the target PC from many Internet resources, such as peer-to-peer networks or newsgroups. Fancy Trojan often makes a lot of destructive actions, which can become a reason of many problems, such as computer instability or the loss of performance. The following files were created in the system:

Farfrom Trojan

Posted: March 28, 2006 | Category: Trojans
There are a lot of variations of this trojan, that's why there's no guarantee that every antiviral computer will catch and remove it from the computer. By sneaking into the computer, Farfrom Trojan gives a partial control over it to the hacker; the hacker is able to make a lot of problems to the user , that's why it's strongly recommended to keep your virus definitions up-to-date in order to prevent this infection. The following files were created in the system:

FAV Trojan

Posted: March 28, 2006 | Category: Trojans
This malicious application is a trojan; this means it doesn't strive to send its copies toother PCs, but concentrates on damaging one single PC. Actions, available to this spyware, may seriously damage the infected computer, that's why it's always recommended to detect and remove this trojan from the infected computer as soon as possible. The following files were created in the system:

FBI Trojan

Posted: March 28, 2006 | Category: Trojans
This dangerous trojan is always a threat to the stability and security of the infected computer. FBI Trojan gives the access to the remote PC to the hacker, who is able pe perform many harmful actions. Keeping your antiviral databases up-to-date in order to prevent your PC from being infected, is always a wise choice. The following files were created in the system:

Remscan

Posted: March 28, 2006 | Category: Remote Administration Tools
A Remote Administration Tool is a special kind of hacker malware, used for remote access and control of other people's PCs. The attacker infects the PC via the e-mail or File and Print Sharing. A "server" allows him to connect via a "client" on his own machine. It opens a default TCP port and awaits commands from the intruder. The functions of a RAT may vary, depending on the needs of the hacker. Some RATs can't really harm your PC and the only purpose they were made for is hooliganism. But...

Rendezvous

Posted: March 28, 2006 | Category: Remote Administration Tools
A Remote Administration Tool is a special kind of hacker malware, used for remote access and control of other people's PCs. The attacker infects the PC via the e-mail or File and Print Sharing. A "server" allows him to connect via a "client" on his own machine. It opens a default TCP port and awaits commands from the intruder. The functions of a RAT may vary, depending on the needs of the hacker. Some RATs can't really harm your PC and the only purpose they were made for is hooliganism. But...

Reporter

Posted: March 28, 2006 | Category: Remote Administration Tools
A Remote Administration Tool is a special kind of hacker malware, used for remote access and control of other people's PCs. The attacker infects the PC via the e-mail or File and Print Sharing. A "server" allows him to connect via a "client" on his own machine. It opens a default TCP port and awaits commands from the intruder. The functions of a RAT may vary, depending on the needs of the hacker. Some RATs can't really harm your PC and the only purpose they were made for is hooliganism. But...

Resoil FTP

Posted: March 28, 2006 | Category: Backdoors
Resoil FTP is a backdoor that gives the attacker remote unauthorized access to an infected PC. This spyware runs a hidden FTP server, which can be used to download, upload and run malicious software. Resoil FTP activity may result in noticeable PC performance loss and user privacy violation.

FD trojan

Posted: March 28, 2006 | Category: Trojans
This dangerous trojan usually tries to sneak into target computer from many internet resources, such as peer-to-peer networks or chats. By damaging different files FD Trojan may be a reason of real problems, which may cause computer instability and even the loss of all data, stored on the infected machine. The following files were created in the system:

Fear Trojan

Posted: March 28, 2006 | Category: Trojans
This trojan is quite harmless. It usually shows a text box with the word 'SUFFER' in it and opens-closes the CD-ROM of the infected PC. Although these actions usually carry no harm, it is still would be the best choice to remove this spyware from the computer as soon as possible. The following files were created in the system:

All-In-One Spy

Posted: March 28, 2006 | Category: Malware
This commercial malware is designed for monitoring actions, performed with PC. The application can log keystrokes and hide the log file in the machine. It also features the ability to record all sounds from microphone and take screenshots with the specified time period. The following files were created in the system:

Feliks Trojan

Posted: March 28, 2006 | Category: Trojans
Feliks Trojan is a dangerous tool in the hands of a hacker. This spyware may allow hacker to carry a lot of damage to the infected PC, which may suffer greatly from many attacks. This may lead to the unproper computer working and the loss of performance, that's why it's always recommended to remove this pest from the machine as soon as possible. The following files were created in the system:

Aurea.653

Posted: March 28, 2006 | Category: Spyware
This virus seeks COM files and writes himself in C:DOS catalogue and current catalogue . In 1-st of march it opens a message: 'I'm sorry, you lost something because of AUREA' removes some C: disc sectors, and 'hangs' the PC. At the beginning of each month, it also removes some randomly chosen sectors. The origination date is April, 2004. The following files were created in the system:

Belcaro GoldenRetriever

Posted: March 28, 2006 | Category: Trackware
This malware is designed to collect information about users behaviour. It connects itself to internet, and spies on all browser activities. It can also reveal your IP address and other private information, like the list of visited sites, forums etc. Some malware applications also reveal what URL you linked from, and even computer information, such as type of the browser you are using, the operating computer and platform, and CPU speed. It was created in October, 2004. The following...