LockMBR Trojan

Posted: March 28, 2006 | Category: Trojans
LockMBR is a dangerous trojan, which was written in Assembler language in 1996. Although it is quite old, it is still dangerous for many operating computers, because of its destructive actions. This spyware is able to cause some very serious computer problems, which may result in many negative effects . The following files were created in the system:

LoginW32

Posted: March 28, 2006 | Category: Trojans
This spyware was designed with a specific aim of stealing many passwords or other confidential data from the infected PC. Loginw32 Trojan performs these tasks by logging user's keystrokes and writing stolen information into c:windowssamples.txt. The following files were created in the system:

Loli Trojan

Posted: March 28, 2006 | Category: Trojans
This BAT-trojan usually acts in a way, which may damage some important files or harm the user in other ways. Loli Trojan usually searches for files in several specific directories and removes all files found. Although these actions don't really carry a great destructive power, it's still recommended to remove this spyware from the infected machine as soon as possible. The following files were created in the system:

Loser Trojan

Posted: March 28, 2006 | Category: Trojans
This malicious application is a trojan, which means that it concentrates on damaging one specific PC instead of sending its copies to other addresses. Once run on the infected machine, Loser Trojan starts performing its destructive actions , that's why it's really important to have your antiviral application updated in order to prevent this infection. The following files were created in the system:

LoveTester

Posted: March 28, 2006 | Category: Trojans
This application is actually a BHO , which means that it atteches itself to the IE and pecomes a part of it. FIrewalls, installed on a target computer, don't usually pay attention to this spyware, because it looks like a default IE browser for them. All in all, LoveTester gets a lof of freedom for its actions, some of which may be really annoying or carry some certain damage to the user's privacy. The following files were created in the system:

Hot Trojan

Posted: March 28, 2006 | Category: Trojans
This malicious software is a trojan, which means that it usually specializes in harming one particular PC. Without any real destructive actions available to it, Hot Trojan performs a set of annoying actions, which may not damage the infected computer greatly, but can lead to the loss of time and performance. The following files were created in the system:

Lucifer Trojan

Posted: March 28, 2006 | Category: Trojans
The Lucifer Trojan is a banking Trojan that collects information from your computer, especially that which is related to banking accounts. Although it's prolific throughout Latin Americ notably, its campaigns are active throughout the world, with robust infrastructural support. Users should have anti-malware products ready for deleting the Lucifer Trojan at all times and change critical security information like passwords afterward ASAP. The combination banking Trojan, general spyware, and...

LWPW Trojan

Posted: March 28, 2006 | Category: Trojans
LWPW Trojan is a dangerous spyware, which specializes in stealing many passwords and login information. This technique is always a threat for the privacy of any user, that's why it's strongly recommended to keep your antiviral application updated in order not to allow LWPW Trojan to sneak into your computer. The following files were created in the system:

Lyusane Trojan

Posted: March 28, 2006 | Category: Trojans
This dangerous spyware has a lot of variations, that's why there's no guarantee that your antiviral computer will definitely detect and remove Lyusane Trojan. This pest usually starts performing its destructive actions right after sneaking silently into a victim PC. These actions may often lead to many negative consequences, such as computer crashes or the loss of important data; that's why removing this spyware from the infected machine is strongly recommended. The following files...

Mabul Trojan

Posted: March 28, 2006 | Category: Trojans
This batch-file infector is a potential threat for every computer with no reliable defence installed on it. Mabul Trojan usually infects other BAT-files by adding its own code to the original codes. This technique makes the infection quite hard to find and remove completely, that's why it's tremendously important not to allow this spyware to sneak into your PC. Keeping your antiviral databases updated would be a good solution. The following files were created in the system:

Mad Daemon Trojan

Posted: March 28, 2006 | Category: Trojans
This dangerous spyware is a potential threat for every computer because of its simple but very effective actions. Daemon Trojan usually searches for and infects other *.COM files. Each time an infected file is run, the infection starts performing its destructive activities, which may often lead to several unwanted effects . The following files were created in the system:

Mag Trojan

Posted: March 28, 2006 | Category: Trojans
Mag Trojan usually acts like a typical file infector on the target machine. This spyware searches for files of many types and infects them with a copy of infection. This method may lead to corruption of several key computer files, which are responsible for computer stability and security. It's greatly recommended to detect and remove Mag Trojan from the machine as soon as possible. The following files were created in the system:

Tyrant Trojan

Posted: March 28, 2006 | Category: Trojans
The name of this spyware describes its activities quite well. Tyrant Trojan usually tyrannize the infected PC by disabling many important functions . This technique may paralyse the machine and cause a lot of unwanted problems, such as the loss of some really important pieces of data. The following files were created in the system:

MBat trojan

Posted: March 28, 2006 | Category: Trojans
This spyware is always a dangerous tool in the hands of hacker. MBat allows the hacker to remotely control the infected computer by creating and running many batch-files. Although this pest doesn't work on Windows NT/2k/XP, users of older operating computers are never protected from destructive activities of MBat Trojan. The following files were created in the system:

Mcon Trojan

Posted: March 28, 2006 | Category: Trojans
This trojan is a dangerous spyware, which specializes in damaging one particular PC, but is also able to infect other machines via many ways, such as mIRC. Mcon trojan performs a wide variety of actions on the infected computer; these actions usually carry a real threat for the stability and the security. This pest makes its copies in every folder of the hard disk; the names of these copies are randomly generated from the list of recently used files. The following files were created...

McVeigh Trojan

Posted: March 28, 2006 | Category: Trojans
Although this dangerous trojan was a real threat in the past, now its problem is resolved and there's nothing to be afraid of. McVeigh Trojan had a really difficult algorithm of infecting the computer; several web sites were used for this purpose. This spyware was also using IRC and ICQ messenger for infecting many PCs. The following files were created in the system:

MemVix Trojan

Posted: March 28, 2006 | Category: Trojans
This memory-resident trojan is always a potential threat for those, who have no reliable defence installed on their PCs. MemVix Trojan is usually performing a set of destructive actions , which are able to make a great damage to the infected computer. The following files were created in the system:

Metahog Trojan

Posted: March 28, 2006 | Category: Trojans
This spyware is a trojan, which means that it doesn't strive to infect as many PCs as possible, but concentrates on damaging one single PC. Metahog Trojan usually infects a computer with no reliable defence installed on it from many resources, such as suspicious web pages or e-mail messages from unknown senders. Actions, which are available to this trojan, can be really destructive and damage the security and the stability of the infected machine greatly. The following files were...

Meteor Trojan

Posted: March 28, 2006 | Category: Trojans
Meteor Trojan usually specializes in stealing many secret passwords and sending stolen data to the anonymous address. These actions are always very harmful for every user, that's why it’s always recommended to keep your antiviral application updated in order to prevent Meteor from sneaking into your computer. The following files were created in the system:

MFM trojan

Posted: March 28, 2006 | Category: Trojans
Although this trojan is really old, it is still very dangerous because of its brutal actions. After sneaking into a target PC, MFM Trojan makes an attempt of erasing the hard disk of this PC. In case of success, all data from the disk will be lost and really hard to restore. It is clear from everything written above, that MFM Trojan is a real threat and should be treated carefully. The following files were created in the system: