Win32.Brontok.AP@mm
Posted: March 8, 2012
Threat Metric
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
Ranking: | 13,263 |
---|---|
Threat Level: | 1/10 |
Infected PCs: | 365 |
First Seen: | March 8, 2012 |
---|---|
Last Seen: | October 2, 2023 |
OS(es) Affected: | Windows |
Win32.Brontok.AP@mm is a worm, and like the majority of its kin, Win32.Brontok.AP@mm is capable of and willing to duplicate itself and spread these duplicates via spam e-mail, local networks and removable hard drives. Although these are fairly stock features for any worm, Win32.Brontok.AP@mm has been placed on the spotlight recently due to its involvement in a triple-coordinated attack of PC threats that, ultimately, promote rogue defragmenters like Windows XP Repair. Win32.Brontok.AP@mm payloads like Trojan.HiddenFilesFraud.A are known for their ability to conceal your computer's files, and since Win32.Brontok.AP@mm will prevent you from reversing these system changes, SpywareRemove.com malware researchers recommend that you delete all three PC threats with a high-quality anti-malware scanner as the solution for its file-vanishing trick. In the meantime, particular attention should be paid to network-shared folders and removable devices, either of which can be exploited for Win32.Brontok.AP@mm's distribution.
Win32.Brontok.AP@mm – a Mass-Mailer Worm with Friends in Low Places
Win32.Brontok.AP@mm was originally noted for its built-in SMTP e-mail client, a capability that Win32.Brontok.AP@mm used to send copies of itself to other computers via spam e-mail messages. However, since its rise back in 2006, Win32.Brontok.AP@mm has seen tweaks that make Win32.Brontok.AP@mm complicit in other attacks, such as downloading other PC threats onto your computer. Win32.Brontok.AP@mm's payload has been known to include both fake defragmenters like Windows XP Repair, as well as Trojans like Trojan.HiddenFilesFraud.A. More unusually, these three PC threats, together, are capable of launching attacks against your file-viewing preferences that make it very difficult to launch other files or programs.
Trojan.HiddenFilesFraud.A is designed to conceal your files and some types of shortcuts by changing their attributes, while Win32.Brontok.AP@mm supports this attack by preventing you from changing your file-viewing preferences to show hidden files. This effective but, in the long term, harmless file invisibility gag is the foremost excuse that Win32.Brontok.AP@mm uses to try to encourage you to spend money on a fake system optimizer like Windows XP Repair. However, since rogue defragmenters like Windows XP Repair and its relatives can't fix such problems or, in fact, any PC problems at all, SpywareRemove.com malware researchers strongly warn you against accepting Win32.Brontok.AP@mm's 'help.'
Getting Your Files Back in Plain Sight After a Win32.Brontok.AP@mm Attack
Due to its ability to create copies of itself, Win32.Brontok.AP@mm should be removed by able anti-malware programs whenever possible, while SpywareRemove.com malware researchers emphasize the necessity of avoiding network or removable drive-based contact with other PCs until Win32.Brontok.AP@mm is completely deleted. You may also want to warn address book contacts about Win32.Brontok.AP@mm, which may attempt to e-mail itself to anyone on your address book after Win32.Brontok.AP@mm harvests the relevant e-mail addresses. If conducted properly, a system scan should also be able to remove Windows XP Repair and Trojan.HiddenFilesFraud.A and their system changes. If you still fail to see your files, this issue can be resolved by opening Folder Options, clicking the View tab and selecting 'Show hidden files, folders and drives.'
SpywareRemove.com malware experts recommend that you perform the above procedures as soon as you have a chance to do so, since Win32.Brontok.AP@mm and related PC threats may cause other attacks that reduce your computer's security if they're left alone for significant periods of time. Additionally, Win32.Brontok.AP@mm is designed to distribute itself automatically and can use your computer's resources to do so until you put your foot down.
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.