Sykipot Trojan
Posted: December 14, 2011
Threat Metric
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
Threat Level: | 9/10 |
---|---|
Infected PCs: | 5 |
First Seen: | December 14, 2011 |
---|---|
Last Seen: | April 19, 2021 |
OS(es) Affected: | Windows |
As can be inferred by its name, which may be obvious to many computer users, the Sykipot Trojan is a highly dangerous computer security threat, which has been categorized as a Trojan and is known to function under the following aliases:
- Backdoor.Trojan [Symantec]
- Backdoor.Win32.Wkysol.B [Microsoft]
- Mal/Generic-L [Sophos]
- Backdoor.Win32.Wkysol [Ikarus]
- Generic BackDoor!dpn [McAfee]
- Backdoor.Win32.Sykipot.bg [Kaspersky Lab]
The Sykipot Trojan has been found exploiting the newly discovered crucial, 'zero-day' flaw in the Adobe Reader and Adobe Acrobat computer programs.
What is the Adobe Software's 'Zero-Day' Flaw?
Adobe has recently warned its consumers about this Adobe Reader and Acrobat security vulnerability, which can be utilized by malware threats – such as the Sykipot Trojan – to allow the remote execution of malicious, infected code. In fact, several reports have already revealed that this Adobe software vulnerability has resulted in targeted attacks.
According to Adobe, the zero-day flaw is known to affect several versions of both Adobe programs, Reader and Acrobat: 'A critical vulnerability has been in Adobe Reader X (10.1.1) and earlier versions for Windows and Macintosh, Adobe Reader 9.4.6 and earlier 9.x versions for UNIX, and Adobe Acrobat X (10.1.1) and earlier versions for Windows and Macintosh. This vulnerability (CVE-2011-2462) could cause a crash and potentially allow an attacker to take control of the affected system.'
Adobe also declared that it will immediately work to patch this particular vulnerability hoping to have the patch fully complete in the next few coming weeks, and according to Adobe's ASSET security team 'The reason for addressing this issue quickly for Adobe Reader and Acrobat 9.4.6 for Windows is simple: This is the version and platform currently being targeted. All real-world attack activity, both in this instance and historically, is limited to Adobe Reader on Windows. We have not received any reports to date of malicious PDFs being used to exploit Adobe Reader or Acrobat for Macintosh or UNIX for this CVE (or any other CVE).'
Sykipot Trojan's Harmful Capabilities
By taking advantage of the Adobe zero-day flaw – as well as other Adobe vulnerabilities/flaws, in the past – this particular Trojan horse has been categorized as a backdoor that works to provide hackers and other malicious cybercriminals with illegal remote access to computers. Via this brand of malicious remote access, hackers and cybercriminals alike, are able to launch all kinds of dangerous processes and activities on compromised computer systems; they may even be able to procure complete control of infected systems, forcing them to comply with their every whim and will.
SpywareRemove.com malware analysts have also reported that this dangerous threat is also capable of generating its own corrupt system processes, creating infected system files, as well as infecting compromised computer systems' Windows Registry by adding, creating new, deleting, and/or altering various registry values.
Any program that provides cybercriminals with remote access should be considered an unwanted and unneeded program. This malicious Trojan needs to be removed from all infected systems as soon as its presence has been discovered.
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.