Alicia Trojan

Posted: March 28, 2006 | Category: Trojans
Alicia Trojan is a dangerous backdoor, which usually acts through IRC network. This pest can infect the PC after its user accepts suspicious DCC file transfer proposal or even follows unknown link. After that, trojan infects mIRC and starts mining user's data. This data is written in a log file and sent to the specified Internet address. The following files were created in the system:

Almaster Trojan

Posted: March 28, 2006 | Category: Trojans
With the help of this destructive tool a hacker can easily get a partial control over the target PC and start performing his or her harmful actions immediately. These actions can vary from stealing user's passwords to deleting key computer files and making the computer unusable. The following files were created in the system:

AlphaDog Trojan

Posted: March 28, 2006 | Category: Trojans
Although this trojan, which was written in Visual Basic, isn't as sophisticated as several its relatives from backdoors' family, it is still possible to give the anonymous hacker a remote control over the computer. The hacker is able to steal user's private information , upload/download files, change computer settings, etc. The following files were created in the system:

Alysium Trojan

Posted: March 28, 2006 | Category: Trojans
Alysium Trojan is a backdoor, which sneaks into the computer via local networks or e-mail messages from unknown senders. After the main file is run, this pest infects the PC and tries to give an access to it to the anonymous hacker. In case of this procedure’s success, the hacker gets an ability of performing a wide variety of actions , which compromise the user's privacy and security strongly. The following files were created in the system:

AMG Trojan

Posted: March 28, 2006 | Category: Trojans
AMG Trojan is a macro-based Trojan that attacks new computers via MS Access files. Trojan infections like AMG Trojan are highly likely to disable the PC security, download and install malicious programs without the user's permission and perform other invasive functions like stealing account passwords. Software-based protection against AMG Trojan exists is a recent development, and you may need to update your anti-malware scanners to detect and remove AMG Trojan. AMG Trojan's most...

Amri Trojan

Posted: March 28, 2006 | Category: Trojans
This malicious application usually infects the computer from a batch-file from unknown Internet locations or suspicious e-mail messages. The main aim of this pest is detecting and infecting the IRC client; after this happens this trojan makes it insecure to exchange messages through this chat, because many pieces of private information can become available to the hacker. The following files were created in the system:

Anakha Trojan

Posted: March 28, 2006 | Category: Trojans
Anakha Trojan is a malicious backdoor, which was designed for capturing user's private information, such as passwords and logins. This spyware's technique is quite easy and effective: it infects the machine from many suspicious Internet resources and connects to the anonymous server. In case of success, it sends log files with the user's information there. The following files were created in the system:

Anaphylaxis Trojan

Posted: March 28, 2006 | Category: Trojans
This malicious trojan, which was written in Assembler language, is a very dangerous spyware. It is always able to become a reason of many problems, such as computer instability, the loss of important data, crashes, etc. It's strongly recommended to keep your antiviral software updated in order to stay protected from spywares of this type. The following files were created in the system:

Anthena Trojan

Posted: March 28, 2006 | Category: Trojans
This malicious spyware is a typical backdoor trojan; this means Anthena Trojan acts by providing the hacker with an access to the remote PC and the ability of performing many destructive actions on this particular PC. Firstly, the hacker can easily steal user's confidential information, such as passwords. Secondly, the hacker is able to modify many computer settings and files. All this can lead to different unwanted consequences, that's why removing this pest as soon as possible would always...

Antigen Trojan

Posted: March 28, 2006 | Category: Trojans
Antigen Trojan is a specific spyware, which was designed with one aim of stealing user's passwords. Once run on the PC, this pest starts waiting for user's input and writes everything into a special log file, which it later sends to the anonymous hacker. In case of success, the hacker gets a total control over the user's Internet accounts. The following files were created in the system:

AntiLamer Trojan

Posted: March 28, 2006 | Category: Trojans
This multifunctional spyware is tremendously dangerous for everyone, who has no reliable security installed on his or her PC. AntiLamer Trojan is a backdoor trojan with an inbuilt ability of killing antiviral computers. After the user's antivirus is disabled, this pest tries to connect the remote server and give the control over infected PC to the hacker. In case of success, the hacker gets an ability of performing unlimited number of destructive actions, such as stealing user's passwords,...

Antrax Trojan

Posted: March 28, 2006 | Category: Trojans
This spyware, which was created with the help of Visual Basic Script, usually infects the computer as a macro from many documents. Once run on a target PC, this pest tries to find IRC client and, in case of success, infects it and starts monitoring user's activities. This technique makes it unsafe to exchange messages and data via this chat, because all information is easily available to the anonymous hacker. The following files were created in the system:

Apache Trojan

Posted: March 28, 2006 | Category: Trojans
This malicious spyware is a trojan, which was designed for harming UNIX computers with Apache Web server installed on it. In case of success, this trojan can lead to many unwanted computer changes and even harm the stability of this computer's user. The following files were created in the system:

Aphex Trojan

Posted: March 28, 2006 | Category: Trojans
Aphex Trojan is an extremely dangerous Trojan horse infection that could result in damage to your computer. Aphex Trojan was found to have the ability to record keystrokes and open a connection to a remote attacker. Aphex Trojan may lead to theft of your personal data stored on your system. Aphex Trojan also referred to as Trojan-Downloader.Aphex. You may notice your computer running slow in some cases if you are infected with Aphex Trojan. It may be difficult to manually remove the Aphex...

Aplore Trojan

Posted: March 28, 2006 | Category: Trojans
Aplore Trojan is a Trojan application, which is designed to steal user's sensitive data, including passwords, and sending them to the anonymous remote attacker. Aplore Trojan usually deals with ICR, AIM and some other messengers, which usually store passwords or require user to enter it manually. Aplore Trojan opens a huge security hole on your PC and is recommended to be removed immediately. The following files were created in the system:

Argentino Trojan

Posted: March 28, 2006 | Category: Trojans
Argentino Trojan is a spyware, which was created for providing the anonymous hacker with a remote access to the infected PC. This pest acts by opening a specified port and allowing the hacker to send his or her commands, such as performing many computer changes or stealing user's passwords. The following files were created in the system:

BAT.Arica

Posted: March 28, 2006 | Category: Trojans
BAT.Arica is a dangerous batch-file infector, which specializes in performing several harmful actions. First of all, this pest tries to disable antiviral applications, which are installed on the target PC. What is more, this spyware infects many files with a copy of its own code. The following files were created in the system:

Aristotles Trojan

Posted: March 28, 2006 | Category: Trojans
This spyware is a mIRC infector, which specializes in damaging this popular chat client. In case of success of its actions, this pest becomes able to monitor user's activities and steal his or her messages and passwords. This technique is tremendously dangerous, because it can often result in the loss of user's accounts. The following files were created in the system:

Arturik Trojan

Posted: March 28, 2006 | Category: Trojans
Arturik Trojan usually uses a common technique of sneaking into the PC and giving a remote control over it to the anonymous hacker. This gives the hacker a possibility of performing many destructive actions, such as stealing user's passwords and login information, uploading/downloading different files, damaging key computer components, etc. The following files were created in the system:

Assault Trojan

Posted: March 28, 2006 | Category: Trojans
This malicious application is often being used by many hackers as a tool for DoS attacks. The main aim of these attack is simultaneous connections to web server in order to make it work improperly or even temporarily disable it. Although this specific spyware doesn't carry a lot of harm for the ordinary user, it's still strongly recommended to get rid of it as soon as possible. The following files were created in the system: