Home Malware Programs Trojans TrojanSpy:Win32/Nivdort.CE

TrojanSpy:Win32/Nivdort.CE

Posted: December 2, 2015

Threat Metric

Threat Level: 2/10
Infected PCs: 108
First Seen: December 2, 2015
Last Seen: August 13, 2022
OS(es) Affected: Windows

TrojanSpy:Win32/Nivdort.CE is the detection name of threats that may attack any Windows-based computer. This parasite is designed to monitor its victims ' activities. Its main task is to collect information from unsuspecting users. TrojanSpy:Win32/Nivdort.CE may not try to copy files that are stored on the hard disk. Although your pictures, videos, and documents may have immense value to you, the culprits cannot profit from them unless you are a celebrity. The con artists try to obtain your online credentials. The usernames and their respective passwords can allow the hackers to take your money. If they manage to log into your bank accounts or other payment accounts, they may initiate a transfer without your knowledge. The passwords for your emails may allow them to hack into all connected accounts, which also may result in financial losses. Just like the majority of information-collecting parasites, the presence of this Trojan is not accompanied by visible functionality issues. Any performance problem will encourage the victims to take actions, which is why TrojanSpy:Win32/Nivdort.CE works in secrecy. It may open a backdoor on the affected machine that will connect it to distant Command and Control (C&C) servers. Any information that this threat obtains will be transmitted to these servers, which are controlled by hackers. The existence of certain files may reveal the presence of TrojanSpy:Win32/Nivdort.CE. If you can locate fmyfnyn.exe, swhmzdew.exe or uophr22hupjgbndfbn.exe in the c:\cxswuaigismdg directory, you should take measures right away. Unfortunately, this Trojan injects its codes into the processes of legitimate programs. Unless you are an expert, you may be unable to fix your PC manually. If you opened suspicious email attachments recently or have other reasons to assume you may be infected, you should run an in-depth system scan with a dedicated security application.

Loading...