JAVA_JACKSBOT.A
Posted: November 1, 2012
Threat Metric
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
Threat Level: | 8/10 |
---|---|
Infected PCs: | 33 |
First Seen: | November 1, 2012 |
---|---|
Last Seen: | January 13, 2021 |
OS(es) Affected: | Windows |
JAVA_JACKSBOT.A is a backdoor Trojan or RAT (Remote Access Tool) that's just starting to be seen throughout the world in countries such as Australia and Malaysia. Although JAVA_JACKSBOT.A's current distribution levels are quite limited, SpywareRemove.com malware experts warn that JAVA_JACKSBOT.A still is a potential high-level threat to any computer that becomes infected by JAVA_JACKSBOT.A, since JAVA_JACKSBOT.A possesses compatibility with all three major operating systems (Windows, Linux and Mac). In addition to including many basic functions that are common for backdoor Trojans, JAVA_JACKSBOT.A includes a function to target and steal passwords for the popular game Minecraft. JAVA_JACKSBOT.A, like most backdoor Trojans, doesn't have any overt symptoms and should be removed with anti-malware scans from appropriate software.
Why Gamers with Computers Should Be Afraid of JAVA_JACKSBOT.A
In the Internet at large, JAVA_JACKSBOT.A only has two confirmed infections, although circumstantial evidence points to JAVA_JACKSBOT.A's continued development and, with it, development of more potent distribution routes. Because JAVA_JACKSBOT.A includes attacks that are specific to the Minecraft program, SpywareRemove.com malware analysts warn that JAVA_JACKSBOT.A may be distributed in the form of a fake Minecraft add-on or as an 'extra' that's included with compromised installers related to that game. This Minecraft-specific attack is devoted to stealing passwords, which can allow criminals to hijack Minecraft accounts and exploit them for their own purposes.
JAVA_JACKSBOT.A uses a range of different functions that all are designed for compromising your PC's security, stealing information and granting criminals access to your PC without your consent. Specific attacks are elaborated on further in this article. Because JAVA_JACKSBOT.A is a Java-based Trojan, JAVA_JACKSBOT.A can launch in any OS that supports Java. SpywareRemove.com malware research team's current analyses indicate that most of JAVA_JACKSBOT.A's attacks are designed for Windows, although this is likely to change as future versions of JAVA_JACKSBOT.A are developed.
All the Trouble that this Jack Can Cause When It Pops Open
Other than its Minecraft password-stealing tendencies, JAVA_JACKSBOT.A's functions tend to be typical for its type of malware. Other attacks that SpywareRemove.com malware researchers have confirmed as being part of JAVA_JACKSBOT.A's arsenal include:
- Deleting files.
- Launching files (including installers for other malware).
- Blocking programs by terminating their memory processes.
- Forcing your PC to restart or shut itself down.
- Keylogging (recording your keyboard typing).
- Taking screenshots.
- Displaying arbitrary Windows dialog boxes.
- Accessing web content by specified URLs.
- Launching DDoS attacks to crash websites.
- Stealing system information (which can be exploited in other attacks).
- Recording mouse cursor events.
Due to the range of dangerous features that JAVA_JACKSBOT.A displays, if you've had any possible contact with JAVA_JACKSBOT.A or other members of the Jacksbot family, SpywareRemove.com security analysts encourage you to use anti-malware solutions to delete JAVA_JACKSBOT.A promptly.
Technical Details
File System Modifications
Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.
The following files were created in the system:file.jar
File name: file.jarSize: 478.1 KB (478101 bytes)
MD5: 0c19e3d68c08d4bf547db0f003295c84
Detection count: 78
Mime Type: unknown/jar
Group: Malware file
Last Updated: July 5, 2017
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.