Home Malware Programs Backdoors Backdoor:Win32/Bezigate.A

Backdoor:Win32/Bezigate.A

Posted: November 6, 2012

Threat Metric

Threat Level: 2/10
Infected PCs: 78
First Seen: November 6, 2012
OS(es) Affected: Windows

Backdoor:Win32/Bezigate.A is a backdoor Trojan that lets criminals control your PC by exploiting hidden vulnerabilities. While Trojans that are founded on an identical code as Backdoor:Win32/Bezigate.A Trojans have been known to steal confidential information, Backdoor:Win32/Bezigate.A may be used to launch other attacks – particularly those that involve the installation of other malware or disabling your security programs. Because Backdoor:Win32/Bezigate.A doesn't have symptoms, uses file names that aren't obvious and makes changes to the Windows Registry, SpywareRemove.com malware research team encourages the usage of anti-malware scanners whenever detecting or removing Backdoor:Win32/Bezigate.A becomes necessary.

Backdoor:Win32/Bezigate.A – the Invisible Hand of Criminal Coders at Work

Backdoor:Win32/Bezigate.A is designed solely to force infected PCs to relinquish control over to criminals who access the infected computer via a Control & Command server. Like TrojanSpy:Win32/SSonce.C, Backdoor:Win32/Talsab.C and Backdoor:Win32/Nosrawec.C, Backdoor:Win32/Bezigate.A uses the copy-pasted code of an old Trojan from 2010, but includes enough minor additions and changes to be considered to be an individual PC threat unto itself.

Attacks by Backdoor:Win32/Bezigate.A can vary with the commands that are given to Backdoor:Win32/Bezigate.A by its criminal controllers, although SpywareRemove.com malware experts have noted the following problems as being highly likely in a Backdoor:Win32/Bezigate.A infection:

  • Unauthorized control over keyboard input (typing).
  • Unauthorized control over mouse cursor movement and clicks.
  • Attempts to steal personal information by screen captures, keylogging and other means that are common to backdoor Trojans with spyware features.
  • Downloading and installing other malware onto your PC.
  • Blocked applications, especially in the case of prominent anti-virus scanners. Booting Windows into Safe Mode or booting from USB drives can be used to work around any problems using programs that you require to disinfect your PC of Backdoor:Win32/Bezigate.A.

Erecting a Security Gate Around a Bezigate Trojan

SpywareRemove.com security analysts have discovered that most backdoor Trojans are dangerously invasive both with respect to their security changes and their attempts to collect information, and Backdoor:Win32/Bezigate.A can be considered no different from its relatives in this respect. Backdoor:Win32/Bezigate.A may include various means of avoiding detection by outdated anti-malware scanners, and you should always check to verify that your anti-malware software of preference is updated before you make an effort to delete Backdoor:Win32/Bezigate.A.

Backdoor:Win32/Bezigate.A, also known as Trojan.Win32.Agent.tntb, doesn't show any type of obvious visual symptoms in the attacks noted above. Most Windows PCs are vulnerable to Backdoor:Win32/Bezigate.A, although, for now, other operating systems don't appear to be compatible.

Since Backdoor:Win32/Bezigate.A changes the Windows Registry and may install other PC threats, any anti-malware scans that are used to remove Backdoor:Win32/Bezigate.A also should scan the rest of your computer. A failure to remove all of the system changes wrought by Backdoor:Win32/Bezigate.A can cause long-term security issues for your PC that may end up in the theft of confidential information or other attacks.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



%windir%\age yaha.exe File name: %windir%\age yaha.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file

Registry Modifications

The following newly produced Registry Values are:

HKEY..\..\{Value}HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run "yaahaha" = "c:\windows\age yaha.exe"
Loading...