Troj/BredoZp-KP
Posted: July 6, 2012
Threat Metric
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
Threat Level: | 8/10 |
---|---|
Infected PCs: | 20 |
First Seen: | July 6, 2012 |
---|---|
Last Seen: | February 14, 2023 |
OS(es) Affected: | Windows |
Troj/BredoZp-KP is a Zip archive that's used to distribute the Trojan Troj/Agent-WXL, a PC threat that compromises your computer's security by making unauthorized contact with remote IP addresses. Spam e-mail that carries Troj/BredoZp-KP can be identified by their characteristic subject line of 'You pig!' along with accompanying text that implies that the file attachment is a collection of compromising pictures. Opening Troj/BredoZp-KP will result in your PC being infected by Troj/Agent-WXL, which can make system changes without permission and will attempt to conceal many of its attacks under the Windows component 'cmd.exe.' SpywareRemove.com malware experts strongly advise you to scan file attachments like Troj/BredoZp-KP prior to downloading them, and also recommend that you use anti-malware software to remove Troj/BredoZp-KP's payload from your PC if you have any reason to think your computer has been compromised by this PC threat.
Troj/BredoZp-KP – the Photographic Evidence of Your Wrongdoing That's Turned into Wrongdoing Against You
Although there's nothing stopping criminals from using other scams to distribute Troj/BredoZp-KP, Troj/BredoZp-KP's current tactics use spam messages that allege to be sent from a LinkedIn acquaintance. This contact accuses you of ignoring their communications and threatens to send supposedly incriminating pictures to your partner if you don't alleviate the situation immediately. In reality, though, this file attachment (cleverly named DCIM, a reference to Digital Camera Images) is Troj/BredoZp-KP, a Zip archive that, once opened, will install the Trojan Troj/Agent-WXL.
SpywareRemove.com malware researchers have noted that Troj/Agent-WXL does make contact with remote IP addresses, which is a common trait for backdoor Trojans and Trojan downloaders that install other PC threats or allow criminals to access your PC. After its installation, Troj/Agent-WXL is not likely to display very visible symptoms, particularly since Troj/Agent-WXL has been noted to use normal Windows components to hide its presence on infected computers. Troj/Agent-WXL and similar PC threats that are distributed by Troj/BredoZp-KP and equally-malicious archive files should be considered high-level threats to be disinfected immediately, and preferably with some help from trustworthy anti-malware products.
The Simplest and Surest Defense Against Troj/BredoZp-KP
SpywareRemove.com malware research team particularly recommends that you watch for e-mail messages that resemble Troj/BredoZp-KP's known template and erase them immediately after you see them in your mailbox (hopefully, in your spam folder). If you insist on downloading a potential Troj/BredoZp-KP zip file, you should always scan it beforehand so that your anti-malware software can confirm it as safe. PC security companies have had protection from Troj/BredoZp-KP available since early July, although anti-malware products with outdated databases may be unable to detect Troj/BredoZp-KP.
If your computer has been infected after you opened a Troj/BredoZp-KP file, you should act quickly and scan your PC to make sure that all known PC threats, including Troj/Agent-WXL, are removed as safely and expediently as possible. Afterward, you may need to restore some system components from a backup or repair Windows from a CD, if your security software is incapable of reverting the damage to your system settings.
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.