Posted: April 21, 2014
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
|First Seen:||April 21, 2014|
|Last Seen:||December 26, 2021|
VirTool:JS/Obfuscator.EK is a detection for threats that have been deliberately obscured to make its identification difficult. Although VirTool:JS/Obfuscator.EK may be applied to a wide swathe of different PC threats, malware experts often link them to the Blackhole Exploit Kit and other attackers that are hosted on compromised Web pages. Protection from VirTool:JS/Obfuscator.EK may take as many forms as its interior code, but always should include anti-malware tools for finding and removing VirTool:JS/Obfuscator.EK, hopefully, before VirTool:JS/Obfuscator.EK can cause any harm.
- E-mail spam may include fraudulent file attachments that are protected from being identified as threatening. These versions of VirTool:JS/Obfuscator.EK Trojans usually have no specific purposes, beyond installing additional threatening software, which may be embedded in their bodies or downloaded from a remote server.
- However, a download attack from VirTool:JS/Obfuscator.EK may occur automatically. Exploit kit-based variants of VirTool:JS/Obfuscator.EK Trojans are hosted on threatening or hacked websites, and may launch automatically. PCs with relevant software vulnerabilities may be automatically infected with threats.
- In other cases, VirTool:JS/Obfuscator.EK may be a defense for threats that already are on your system, as opposed to an installer for threats. High-level threats known to include these defenses include banking Trojans, rootkits, backdoor Trojans and other types of threats with multiple components.
Clarifying the Obfuscation of a VirTool:JS/Obfuscator.EK Trojan
In some ways, detecting VirTool:JS/Obfuscator.EK may be a good thing – since it indicates that your anti-malware software has correctly identified a threatening program, despite that program's efforts to hide itself. However, VirTool:JS/Obfuscator.EK's defenses may prevent your anti-malware tools from identifying a PC threat as specifically as would be appropriate, and can leave the nature of attacks against your PC in doubt. As a general precaution against any threat with uncertain capabilities, malware experts recommend assuming that a VirTool:JS/Obfuscator.EK-compromised PC has the potential to have sensitive information collected from it, such as online account passwords. Third parties having remote access to the infected computer also is a common consequence.
Although changing passwords and re-securing any violated accounts obviously are important concerns, you also should attempt to delete VirTool:JS/Obfuscator.EK through the same anti-malware products that detected VirTool:JS/Obfuscator.EK, before all other tasks. Preventing other PCs from coming into contact with a VirTool:JS/Obfuscator.EK infection through USB devices or local networks also is critical.
VirTool:JS/Obfuscator.EK may be associated with PC threats that have more than one component. Making full use of the most in-depth system-scanning functions available to you will let your security software detect other threats related to VirTool:JS/Obfuscator.EK, which is at least as important as deleting VirTool:JS/Obfuscator.EK, itself.
Use SpyHunter to Detect and Remove PC Threats
If you are concerned that malware or PC threats similar to VirTool:JS/Obfuscator.EK may have infected your computer, we recommend you start an in-depth system scan with SpyHunter. SpyHunter is an advanced malware protection and remediation application that offers subscribers a comprehensive method for protecting PCs from malware, in addition to providing one-on-one technical support service.
Why can't I open any program including SpyHunter? You may have a malware file running in memory that kills any programs that you try to launch on your PC. Tip: Download SpyHunter from a clean computer, copy it to a USB thumb drive, DVD or CD, then install it on the infected PC and run SpyHunter's malware scanner.