JS_BLACOLE.SMTT
Posted: June 13, 2013
Threat Metric
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
Threat Level: | 10/10 |
---|---|
Infected PCs: | 43 |
First Seen: | June 13, 2013 |
---|---|
OS(es) Affected: | Windows |
JS_BLACOLE.SMTT is an identifier for websites that host a variation of the Blackhole Exploit Kit (also known as BEK or Blacole), a configurable assortment of exploits that install malicious software onto your PC as soon as you load the relevant website. Exemplary of Blacole's basis as a global PC threat, JS_BLACOLE.SMTT has been identified on a variety of websites catering to many regions, including some oriented towards residents of Japan. Sites hosting JS_BLACOLE.SMTT may be deliberately malicious, but usually are ordinary sites that are compromised through various means (sometimes related to outdated website maintenance software), and can launch JS_BLACOLE.SMTT without any symptoms appearing to clue you in to JS_BLACOLE.SMTT's attack. Browser security is central to blocking JS_BLACOLE.SMTT's attacks, and SpywareRemove.com malware researchers never recommend using anything less than suitable anti-malware software to remove JS_BLACOLE.SMTT's payload, which can include high-level threats like Trojan Zeus, Police Ransomware Trojans and rootkits.
When It's the 'Pop-unders' Rather than the pop-ups That You need to Fear
JS_BLACOLE.SMTT is one of a fairly large and diverse group of Blackhole Exploit Kit variants, all of which are built with the intention of distributing malicious software through drive-by-download attacks. JS_BLACOLE.SMTT and other variants of BEK usually operate through iFrame exploits that are inserted onto innocent but insecure websites, with JS_BLACOLE.SMTT's content loading behind the browser window as a form of concealment. Naturally, SpywareRemove.com malware researchers must emphasize this point as the most important link in the chain of JS_BLACOLE.SMTT's widespread distribution: website administrators with outdated software are most vulnerable to having their sites hacked, and preventing such attacks will prevent your site's traffic from being exposed to JS_BLACOLE.SMTT's attacks.
JS_BLACOLE.SMTT may be configured for different exploits, which JS_BLACOLE.SMTT will choose on the basis of the exploitable software on your computer. Vulnerabilities abused by JS_BLACOLE.SMTT in order to drive its download include those for Flash, PDF readers and Microsoft Office, and usually consist of a reasonable variety of both outdated and new exploits. Outdated vulnerabilities that should have been corrected by the victim patching his software are, lamentably, the majority of successful JS_BLACOLE.SMTT attacks. However, SpywareRemove.com malware researchers warn that JS_BLACOLE.SMTT also is capable of using exploits that are not yet corrected by any patches, and that JS_BLACOLE.SMTT's download attack can install malware without any immediate visibility of the process.
Blacking Out JS_BLACOLE.SMTT's Chances of Infecting Your Computer
Appropriate precautions on the part of website admins and maintainers already have been mentioned, but SpywareRemove.com malware experts also suggest that any web-surfers also protect themselves from JS_BLACOLE.SMTT and similar drive-by-downloading PC threats. Disabling often-exploited features like Java or Flash, avoiding sites with a history of poor security, installing all security patches and keeping anti-malware programs with web security functions all can reduce the chances of JS_BLACOLE.SMTT getting a successful attack against your computer.
The symptoms related to a JS_BLACOLE.SMTT attack can be as variable as their payloads, which have been known to run the gamut from fake Police Trojans to rogue anti-virus scanners to rootkits. Perhaps the most well-known of these PC threats is Zeus, one of many Trojans – albeit an exceptionally well-developed one – that specialize in a combination of backdoor security attacks and information-stealing spyware functions.
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.