Trojan.Yakes.ljl
Posted: December 27, 2011
Threat Metric
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
| Ranking: | 19,188 |
|---|---|
| Threat Level: | 9/10 |
| Infected PCs: | 176 |
| First Seen: | December 27, 2011 |
|---|---|
| Last Seen: | March 5, 2025 |
| OS(es) Affected: | Windows |
Taking advantage of online paranoia as its own propagation route, Trojan.Yakes.ljl is a Trojan dropper that spreads as a file attachment for e-mail messages that notify you about changes to your Facebook password. Because these messages are formatted to look convincing and even have a spoofed 'sender' address, you may be fooled by Trojan.Yakes.ljl's spam – right up until Trojan.Yakes.ljl requests you to download and open a file attachment. Legitimate Facebook messages will never make this request for the very obvious reason that Trojan.Yakes.ljl presents a serious security hazard, and SpywareRemove.com malware researchers discourage doing anything but deleting Trojan.Yakes.ljl spam as soon as you see it in your mailbox. If you accidentally install Trojan.Yakes.ljl, your PC may be in danger of other attacks by spyware, rogue security products or other PC threats, and in such cases, a hasty scan with solid anti-malware software is strongly recommended.
Trojan.Yakes.ljl: Other Types of Malicious Software Lie in Wait Behind That Helpful Zip File
Mass-mailed messages from Trojan.Yakes.ljl take the form of security alerts from Facebook and will even use Facebook's standard blue logo as well as its basic format for notifications. These notices announce that your account has been compromised by spam and that your password was automatically-changed to protect it from further abuse. In providing this kind of high-level risk as its bait, Trojan.Yakes.ljl hopes that victims will panic long enough to forget how unwise it is to attend the rest of the e-mail message's advice – opening an included file attachment.
This attachment, 'alert[randomnumbers].zip,' may appear to possess your new password, but, of course, the information contained in Trojan.Yakes.ljl's e-mail message is fraudulent and there's no new password to acquire. What you will acquire when you open this file is a fresh case of infection by Trojan.Yakes.ljl, which will run automatically, contact a command server for instructions and proceed to install other PC threats as per its instructions.
Why Trojan.Yakes.ljl is the Beginning But Not the End of Your PC Problems
After its installation, Trojan.Yakes.ljl is unlikely to show very-visible symptoms of its activities, although SpywareRemove.com malware researchers note that you may be able to catch Trojan.Yakes.ljl by noticing unusual RAM usage, altered network settings or exceptions in your firewall. Because Trojan.Yakes.ljl can configure to install a variety of PC threats, any or all of the following possibilities attendant with any Trojan.Yakes.ljl infection can happens:
- Loss of personal information due to spyware attacks that monitor keyboard input, scan files for passwords and redirect you to phishing sites.
- The presence of fake system alerts and other types of inaccurate pop-ups that exist to promote rogue security applications.
- Loss of security due to the presence of backdoor Trojans or rootkits that allow criminals to take control of your PC.
Removing Trojan.Yakes.ljl as soon as possible and with suitable anti-malware software will help to prevent these possibilities from occurring, and a total system scan with up-to-date software should insure that any PC threat that's installed by Trojan.Yakes.ljl is also detected.
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.