JS:Banker-IC
Posted: July 4, 2012
Threat Metric
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
Threat Level: | 8/10 |
---|---|
Infected PCs: | 12 |
First Seen: | July 4, 2012 |
---|---|
Last Seen: | February 18, 2022 |
OS(es) Affected: | Windows |
JS:Banker-IC is a Java-based banking Trojan that monitors your web-browsing activities and intercepts confidential information that's transmitted to bank websites. This can result in identity theft, unauthorized online transactions and other exploits that misuse your personal information for criminal profit. Although JS:Banker-IC should be, like most banking Trojans, a high-level PC threat, SpywareRemove.com malware analysts have found relatively few symptoms of JS:Banker-IC's attacks, which may be undetectable without an appropriate anti-malware program that can catch and warn against JS:Banker-IC mid-heist.
From the Browser to Your Bank with JS:Banker-IC
Although recent reports of JS:Banker-IC infections are fast-becoming widespread, SpywareRemove.com malware research team hasn't yet defined JS:Banker-IC's infection vectors. Nonetheless, circumstantial evidence points to JS:Banker-IC being installed by a separate Trojan downloader that is, itself, installed by exploits hosted on malicious or hacked websites. This Trojan downloader is also likely to delete itself after it installs JS:Banker-IC, leaving no traces behind for you to detect JS:Banker-IC's presence or attacks.
In some cases, JS:Banker-IC or related PC threats may cause your web browser or OS to crash, although these symptoms have only occurred in a minority of JS:Banker-IC attacks. JS:Banker-IC's primary function is to steal bank-related information, such as your password and account name, to allow criminals to break into your account. To achieve this goal, JS:Banker-IC monitors browser-based data transmissions for a variety of bank websites, and may also redirect you to phishing sites that are built to look identical to the bank sites that they imitate. If you have a reason to assume that your private information has been affected by JS:Banker-IC, after disinfecting your computer, SpywareRemove.com malware researchers strongly stimulate you to communicate with your bank for steps to take on securing your account from fraud and related attacks.
How JS:Banker-IC Can Be Everywhere at the Same Time
If you have anti-malware software that detects attacks as they occur, you may experience JS:Banker-IC pop-ups with a wide range of applications. Tragically, this has led to some victims of JS:Banker-IC attacks to assume that these JS:Banker-IC warnings are false positives. The reality of these alerts is that JS:Banker-IC, as a JavaScript-based PC threat that can be used by default by many different applications, including most web browsers, legitimate JS:Banker-IC infections can be detected for many unrelated programs.
Because JS:Banker-IC is a relatively new PC threat that may be concealed by related Trojans or rootkit components, you should make sure that your anti-malware software is updated and that all PC threats are deactivated before you scan your computer. Deactivating PC threats to remove JS:Banker-IC can be accomplished by booting from a removable media device or, in some cases, by booting with Safe Mode. However, SpywareRemove.com malware researchers emphasize that deleting JS:Banker-IC quickly is necessary for your PC's privacy, since information that's stolen by JS:Banker-IC will remain so even if JS:Banker-IC is removed afterwards.
You can delete the prgaorm from quarantine now, and if you can, try and configure your antivirus software to automatically remove quarantined files after a certain period of time.You shouldn't leave malware in quarantine for a very long period of time, since quarantined files takes up a certain amount of disk space.