Home Malware Programs Rootkits MBR:Alureon-K [Rtk]

MBR:Alureon-K [Rtk]

Posted: December 2, 2011

Threat Metric

Ranking: 12,271
Threat Level: 10/10
Infected PCs: 454
First Seen: December 2, 2011
Last Seen: October 8, 2023
OS(es) Affected: Windows

MBR:Alureon-K [Rtk]‎ is a detection label for a Master Boot Record that's been infected by an Alureon-based rootkit. After compromising your MBR, MBR:Alureon-K [Rtk]‎ may be used to install and launch more-specialized Alureon components than itself that can steal personal information, alter your security settings and perform other attacks against your computer. SpywareRemove.com malware researchers note that there are no plain symptoms of a MBR:Alureon-K [Rtk]‎ infection, which uses rootkit techniques to conceal itself, although anti-malware applications should be able to detect and delete MBR:Alureon-K [Rtk]‎ under normal circumstances. Any scans to remove MBR:Alureon-K [Rtk]‎ should be thorough, since MBR:Alureon-K [Rtk]‎ is incredibly unlikely to be the only Alureon-related infection on a compromised PC.

The Basics of How MBR:Alureon-K [Rtk]‎ Burrows to the Heart of Windows

MBR:Alureon-K [Rtk]‎ exploits the MBR to launch itself automatically and avoid detection from insufficiently-advanced security products, a tactic that's earned MBR:Alureon-K [Rtk]‎ the name of 'bootkit,', AKA 'rootkit that infects the Master Boot Record.'. Although MBR:Alureon-K [Rtk]‎ isn't able to distribute itself, MBR:Alureon-K [Rtk]‎ usually is installed by other PC threats that may include self-propagation capabilities. Obviously, SpywareRemove.com malware experts strongly discourage attempts to delete MBR:Alureon-K [Rtk]‎ without any assistance from appropriate software or PC security experts, since this can damage Windows permanently.

MBR:Alureon-K [Rtk]‎ may also inject malicious code into normal Windows processes or change various Registry and DNS settings to cause attacks that can include:

  • Redirects to phishing websites – especially sites that pretend to be popular bank websites to steal account information.
  • Theft of browser-based data transmissions (passwords, user names, security questions, etc.).
  • Alterations to web pages to inject malicious content for phishing purposes.

Why a Little MBR:Alureon-K [Rtk]‎ Infection is Big News

Alureon-based PC threats have grown in prominence due to massive distribution schemes that have compromised millions of PCs to date, and MBR:Alureon-K [Rtk]‎ is still noted as being in distribution as of this article's writing. Without anti-malware software to detect MBR:Alureon-K [Rtk]‎ automatically, most victims of MBR:Alureon-K [Rtk]‎ infections only become aware of MBR:Alureon-K [Rtk]‎'s attacks once they begin to experience random BSODs (the Windows Blue Screen of Death). Due to lawful server seizures and shutdowns that have affected MBR:Alureon-K [Rtk]‎'s Command & Control servers, specific MBR:Alureon-K [Rtk]‎ infections may be incapable of launching additional attacks, but should still be deleted as a distinct compromise of your operating system's integrity.

PC threats that are often found alongside recent MBR:Alureon-K [Rtk]‎ attacks include, but aren't limited to TDSS rootkits, BrowserHijacker.Favorites and Adware.IWin Games. SpywareRemove.com malware researchers stress that most versions of Windows are vulnerable to MBR:Alureon-K [Rtk], although non-Windows PCs are, for now, safe.