Home Malware Programs Trojans TrojanDownloader: JS/Swabfex.P

TrojanDownloader: JS/Swabfex.P

Posted: March 8, 2016

Threat Metric

Threat Level: 9/10
Infected PCs: 112
First Seen: March 8, 2016
Last Seen: October 18, 2020
OS(es) Affected: Windows

TrojanDownloader: JS/Swabfex.P is a perilous cyber threat written in JavaScript that may enter unnoticed and connect the infected machine to distant Command and Connect (C&C) servers. Some hackers may use this Trojan dropper as the first step of detrimental attacks, which may make the PC of the victim unusable. By itself, TrojanDownloader: JS/Swabfex.P may not cause immediate damage. However, it may download additional threats, which may result in all kinds of issues. The experts have confirmed that TrojanDownloader: JS/Swabfex.P has been used to install variants of TeslaCrypt. This file-encrypting parasite locks all files of the victim and keeps them inaccessible until the user pays a ransom. TrojanDownloader: JS/Swabfex.P also may download information-collecting Trojans. They typically work in the background without causing visible problems. Thus, you may be unaware that some advanced parasite may record your online credentials or transfer your data to remote hosts. Unless you know where to search for particular files, you may not suspect that you are infected with TrojanDownloader: JS/Swabfex.P. This threat travels mainly as a .zip file that you may receive as an email attachment. The hackers use various social engineering tactics to make you click on this corrupted file, which will be enough to trigger the infection. You should check if the sender is who he claims to be before opening or downloading attached files. Immediately after entering, TrojanDownloader: JS/Swabfex.P establishes an outgoing connection to specific remote hosts via HTTP. The next step is to download an executable file, which is stored in the %TEMP% directory. Its name is in the format .exe, for example 1.exe or 2.exe. This file may allow the hackers to send instructions to their threats. From this moment on, they may upload cyber threats of their choice. To make sure it doesn't happen, you should have a powerful anti-malware application with a reliable real-time shield.

Loading...