Moshpunt 2K
Posted: March 28, 2006
Threat Metric
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
| Threat Level: | 8/10 |
|---|---|
| Infected PCs: | 26 |
| First Seen: | October 29, 2015 |
|---|---|
| OS(es) Affected: | Windows |
Moshpunt 2K is a high-level Trojan that may collect information. It focuses on the victim's login credentials for various accounts, including email addresses. The functionality and distribution of Moshpunt 2K are very similar to another piece of spyware named Omerstroke. The most significant difference between these two Trojans is that Moshpunt 2K is far more persistent and stubborn. Its developers, whose identity has not been revealed yet, update it on a regular basis. The malware first appeared in 2000, and 15 years later it still exists and tries to obtain information. The hackers that use Moshpunt 2K for their attacks managed to get access to the email passwords of some clients of AOL, which is one of the top media corporations in the USA. You can only imagine the consequences if they enter your email and read all the personal information stored there. When you register on the majority of online platforms, you may receive a verification message in your email with the login credentials. This fact means that if the culprits obtain the password for your email, they may afterwards breach into various other accounts. The results may even be financial losses. Like the majority of information-collecting cyber threats, Moshpunt 2K works in the background. The purpose of these Trojans is not to cause any problems with the Operating System (OS) because then the victim can take actions. Instead, Moshpunt 2K monitors the actions of the victim and records the keystrokes silently. It may transfer the obtained data to Command and Control (C&C) servers regularly. The distribution of this malware may involve the use of compromised email attachments or fake program updates. If you downloaded such software in the recent past, you should scan your PC with a powerful anti-malware tool immediately.
File System Modifications
- The following files were created in the system:
# File Name 1 ipgrapper4vp.frm 2 ipgrapper4vp.vbp 3 module3.bas
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.