Posted: December 24, 2011

SUTRA TDS Description

SUTRA TDS is a browser hijacker that has been known to be used to redirect browsers to malicious websites, including sites that host PC threats such as the BlackHole Exploit Kit. Although SUTRA TDS's designer intends to make money by selling its features for a high price, criminals who purchase SUTRA TDS may use SUTRA TDS for a wide range of their own schemes, including the installation of rogue security programs, collection of ransomware-based fines or conducting widespread phishing attacks. SUTRA TDS attacks usually occur when you visit hostile sites that use iframe exploits like Exploit:HTML/IframeRef.Z; consequentially, malware research team strongly recommends that you use protective web browser settings and keep anti-malware software on alert to prevent any SUTRA TDS as they occur. You should always respond to suspected SUTRA TDS contact by scanning your PC to detect and remove SUTRA TDS's payload, since SUTRA TDS may be complicit in the installation of Trojans, rootkits or other types of PC threats.

Why You'll Want to Disregard SUTRA TDS's Turn Signal

SUTRA TDS (AKA Sutra Traffic Direction System) is an online exploit that's sold as a product capable of handling large quantities of traffic and is primarily-hosted on Russian sites such as, and Sites that use SUTRA TDS will run SUTRA TDS without your consent, and this process may display few or no symptoms other than potentially-visible redirects to unusual sites. Preventative measures that can help to stop SUTRA TDS from affecting your PC include disabling scripts from your web browser, being cautious over unusual sites (particularly those with the .ru domain suffix) and having anti-malware programs that can detect such attacks as they occur.

SUTRA TDS is strongly-associated with the following types of PC threats, which malware experts note may be installed after any contact with SUTRA TDS-hosting sites:

  • BlackHole Exploit Kits that create serious security vulnerabilities on your PC, thus softening it up to allow other PC threats to be installed.
  • Common BEK payloads such as rootkits, backdoor Trojans and Trojan droppers. These types of PC threats may run automatically and without visible symptoms and are complicit in circumstances of reduced security, theft of personal information and other attacks.
  • Ransomware Trojans such as those associated with a series of fake police alerts from countries such as USA, Germany, U.K. and Spain. Ransomware will attempt to disable most functions on your computer while displaying ransom messages that encourage you to spend money to unlock your PC. These messages often include fake legal notices and threats to destroy the files on your hard drive.

Making Sure You Get All of SUTRA TDS's Friends Out of Your PC

Although some possibilities within a SUTRA TDS payload, such as ransomware Trojans, can delivery very obvious symptoms, others, such as rootkits, may not show any symptoms of being active on your PC. malware research team strongly encourages you to use appropriate software to detect and remove any PC threat that may have been installed by a SUTRA TDS exploit.

Because the latest version of SUTRA TDS, 3.4, was only identified late in December of 2011, you should also keep your anti-malware software's threat database up-to-date. Outdated databases may prevent even competent PC security programs from detecting SUTRA TDS attacks. Windows computers are more likely to be targeted by SUTRA TDS than non-Windows systems, although this shouldn't be considered tantamount to immunity for Macintosh, Linux and othersl.

Use SpyHunter to Detect and Remove PC Threats

If you are concerned that malware or PC threats similar to SUTRA TDS may have infected your computer, we recommend you start an in-depth system scan with SpyHunter. SpyHunter is an advanced malware protection and remediation application that offers subscribers a comprehensive method for protecting PCs from malware, in addition to providing one-on-one technical support service.

Download SpyHunter's Malware Scanner

Note: SpyHunter's free version is only for malware detection. If SpyHunter detects malware on your PC, you will need to purchase SpyHunter's malware tool to remove the malware threats. Learn more on SpyHunter. If you would like to uninstall SpyHunter for any reason, please follow these uninstall instructions. To learn more about our policies and practices, visit our EULA, Privacy Policy and Threat Assessment Criteria.

Why can't I open any program including SpyHunter? You may have a malware file running in memory that kills any programs that you try to launch on your PC. Tip: Download SpyHunter from a clean computer, copy it to a USB thumb drive, DVD or CD, then install it on the infected PC and run SpyHunter's malware scanner.

Leave a Reply

Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter. If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.