Gresim
Posted: November 6, 2014
Threat Metric
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
Ranking: | 8,090 |
---|---|
Threat Level: | 8/10 |
Infected PCs: | 4,806 |
First Seen: | November 6, 2014 |
---|---|
Last Seen: | October 9, 2023 |
OS(es) Affected: | Windows |
Gresim is a Windows-based backdoor Trojan used in attacks granting third parties remote access to an infected computer. Gresim may be involved in targeted attacks against business, government and non-profit institutions rivaling or opposing the Chinese government. However, this Trojan includes attack capabilities that put any infected PC at risk of losing confidential information and related issues. Because Gresim includes some defenses against outdated detection techniques, any anti-malware products used for removing Gresim should have their databases patched to include the latest entries for this Trojan.
A New Backdoor with an Old Plan of Attack
Gresim is one of the latest families of backdoor Trojans and RATs to associate with Axiom, a collection of hackers that have targeted defense contractors, 'free Tibet' sympathizers and Google, among others. The Gresim family (also known as Zox, not to be confused with a much older DOS virus by the same name) was confirmed in 2014. However, Axiom has had extensive campaigns going back for years, with each campaign using specialized Trojans to deliver to carefully-selected targets. Distribution models for Gresim Trojans are expected to include hacked websites forced to host threatening scripts, along with e-mail attachments. Most Axiom attacks using the latter method disguise the attachments with the formats of Microsoft Office documents, with subject matter pertaining to the victim's interests or job.
Gresim's successful infiltration lets third parties control your PC from a C&C server. Through that server, third parties may install new threats besides Gresim, modify files or system settings, record your webcam, take screen captures, record your keyboard input or close unwanted applications automatically. Malware experts warn that Gresim also may be instructed to make additional attacks that depend on the information issued from its server, which may include command-line instructions to your PC.
Keeping Well-Used Vulnerabilities Away from Your PC
Gresim may be a fairly new Trojan, but its distribution methods are years old, and include techniques that good anti-malware products should be able to block. Automated browser security should protect your PC from downloads accomplished through hacked websites, and e-mail attachments always can be scanned to detect a Gresim installer or associated threat. In addition, malware researchers also encourage patching all vulnerable software, which can much-reduce the presence of threat-installing exploits. In this respect, Adobe and Microsoft applications are two of the most often-abused brands.
Gresim's attacks are asymptomatic and effectively undetectable by casual observation, but also give third parties almost total access to an infected computer. Windows users can use regular, scheduled anti-malware scans for removing Gresim. Post-removal, all PC users also should account for the possibility of Gresim having transferred information, such as passwords or sensitive documents, from the infected machine into the hands of Axiom or other third parties.
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.