Yeaknet

Posted: March 28, 2006 | Category: Dialers
Yeaknet is a dialer that connects a compromised PC to the Internet by dialing a high-cost phone number using a modem. The threat silently contacts remote web servers and receives additional components and instructions that provide access to pornographic Internet resources. Yeaknet also changes the Internet Explorer default home page and alters web browser's essential security settings. The dialer can get into the computer while visiting some web sites. However, the user must agree to the...

Xpehbam

Posted: March 28, 2006 | Category: Dialers
Xpehbam is a dialer that connects a compromised PC to the Internet through a premium rate phone number by using a modem. The threat is designed to provides access to pornographic web resources. The following files were created in the system:

Greencard

Posted: March 28, 2006 | Category: Dialers
Greencard is a dialer that connects an affected PC to the Internet through premium rate phone number using a modem. The threat also changes the Internet Explorer default home page. Greencard automatically runs on every Windows startup. The following files were created in the system:

Schoeberl

Posted: March 28, 2006 | Category: Trojans
Schoeberl is a dangerous trojan designed to secretly download from the Internet and execute arbitrary files on the compromised PC and install certain security threats, usually some worms, which steal user passwords and online money service accounts. The spyware is distributed by e-mail in messages with infected attachments. Once the user opens such an attachment, Schoeberl immediately installs itself to the computer. It contacts predefined remote servers and downloads malicious files and...

Starimp

Posted: March 28, 2006 | Category: Worms
Starimp is a dangerous Internet worm that spreads through file sharing networks using Kazaa and iMesh peer-to-peer softwares. The spyware steals user passwords and confidential account details of the e-gold online money service. It also downloads from the Internet and executes arbitrary malicious files. The worm arrives in executable files with meaningful names, which may trick the user into running those infected files. Starimp automatically runs on every Windows startup. The...

Drorar

Posted: March 28, 2006 | Category: Trojans
Drorar is a trojan that records user keystrokes and steals computer information. It silently transfers gathered data to predetermined remote servers. Drorar registers itself as a computer service called MSDCSRV32 and automatically runs on every Windows startup. The following files were created in the system:

Connect

Posted: March 28, 2006 | Category: Dialers
Connect is a dialer that provides access to adult Internet resources by dialing a high-cost phone number using a modem. Connect may silently download and install other security and privacy threats to the compromised computer. The dialer can get into your PC from some insecure web sites. It runs on every Windows startup. The following files were created in the system:

DialPlatform

Posted: March 28, 2006 | Category: Dialers
DialPlatform is a dialer that connects a compromised PC to the Internet by dialing a high-cost phone number using a modem. The spyware can secretly get into the computer while visiting some insecure pornographic web sites. The following files were created in the system:

HotPleasure

Posted: March 28, 2006 | Category: Dialers
HotPleasure is a dialer that connects a compromised PC to the Internet by dialing a high-cost phone number using a modem. The threat provides access to pornographic resources. It also modifies web browser's default security settings. HotPleasure can get into the computer while visiting some malicious web sites. Some dialer variants must be manually installed. The following files were created in the system:

PassePartout

Posted: March 28, 2006 | Category: Dialers
PassePartout is a parasitical dialer that connects a compromised PC to the Internet and provides access to adult resources by dialing a premium rate phone number using a modem. The threat can get into the computer while visiting some insecure, usually pornographic, web sites. The following files were created in the system:

XAccess

Posted: March 28, 2006 | Category: Dialers
XAccess is a dialer that connects a compromised PC to the Internet and provides access to pornographic resources by dialing a high-cost phone number using a modem. The threat can get into the computer from malicious pornographic web sites. XAccess automatically runs on every Windows startup. The following files were created in the system:

WhenUSearch

Posted: March 28, 2006 | Category: Adware
WhenUSearch is an adware application that creates a special desktop toolbar, monitors user Internet activity, collects details of performed web searches and serves marketing and advertising content. WhenUSearch can update itself via the Internet. The adware is bundled with ad-supported WhenU.com software. It can also be manually installed. WhenUSearch runs on every Windows startup. The following files were created in the system:

Iberio

Posted: March 28, 2006 | Category: Worms
Iberio is a dangerous Internet worm that spreads by infecting vulnerable PCs running Microsoft Windows operating computer with unpatched security flaws. The spyware has a backdoor functionality. It contacts a predetermined web server and gives the remote attacker unauthorized access to a compromised computer. Iberio also silently downloads from the Internet and installs viral threats, usually some trojans. The worm automatically runs on every Windows startup. The following files...

Searchdot

Posted: March 28, 2006 | Category: Browser Hijackers
Searchdot is a browser hijacker that changes Internet Explorer default home and search pages and blocks access to popular Internet search engines and sites by sending a web browser to a predetermined server. Searchdot is bundled with some advertising-supported software. It can also be manually installed. The spyware runs on every Windows startup. The following files were created in the system:

ICcontrol

Posted: March 28, 2006 | Category: Dialers
ICcontrol, also known as Internet Connection Control, is a dialer that connects a compromised PC to the Internet by dialing high-cost phone numbers using a modem. The threat also enables a proxy and creates a computer service. ICcontrol is bundled with some ad-supported applications and certain spywares. It automatically runs on every Windows startup. The following files were created in the system:

Inker

Posted: March 28, 2006 | Category: Worms
Inker is a specific sript worm written in Visual Basic Script applicationming language. It spreads in the Internet, usually through IRC chat networks using mIRC application or by e-mail in letters with infected attachments. The following files were created in the system:

Dafet

Posted: March 28, 2006 | Category: Worms
Dafet is an Internet worm that infects PCs running Microsoft Windows operating computer with unpatched security vulnerabilities. The spyware downloads from a predetermined remote server and executes certain files, which install a backdoor. Dafet automatically runs on every Windows startup. The following files were created in the system:

Pexmor

Posted: March 28, 2006 | Category: Worms
Pexmor is an Internet worm that propagates by e-mail in messages with infected attachments. Once the user opens such an attachment, the spyware installs itself to the computer and runs a spreading routine. Pexmor uses its own mail engine to send malicious letters to numerous addresses. It also prevents some installed software from running on Windows startup. Although the worm doesn't carries any destructive payload, its activity may severely degrade overall computer performance and Internet...

Messenger Stopper

Posted: March 28, 2006 | Category: Adware
Messenger Stopper is an adware application that shows unexpected commercial pop-up advertisements. The threat also silently contacts certain remote web servers. Messenger Stopper must be manually installed. It runs on every Windows startup. The following files were created in the system:

Peerload

Posted: March 28, 2006 | Category: Worms
Peerload is an Internet worm that spreads through many file sharing networks such as Kazaa, iMesh or eMule. It comes in files with meaningful names that trick the user into downloading and opening them. The following files were created in the system: