Win32/Powessere
Posted: November 12, 2014
Threat Metric
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
Threat Level: | 9/10 |
---|---|
Infected PCs: | 7 |
First Seen: | November 12, 2014 |
---|---|
Last Seen: | July 16, 2019 |
OS(es) Affected: | Windows |
Powessere is a family of Trojan downloaders that download, as well as install additional malware to enable further attacks. Although Powessere Trojans also may conduct other, related activities that harm your computer, there are almost no common symptoms associated with Powessere infections. Because of its low visibility and the invasive nature of its payload, malware researchers saw fit to classify all variants of Powessere Trojans as high-level threats that should be removed by professional anti-malware tools.
Powessere: the Trojan with the Power to Multiply Your Problems
Powessere consists of a range of related Trojans largely identified in 2014 – although they may include well-known attacks that malware researchers have seen previously from other threats. Powessere sometimes is distributed in fake e-mail attachments of the same types that may be used in targeted attacks against corporate or government victims, but the general public also is at risk from infection via similar methods. The combined exploitation of JavaScript and PowerShell installs Powessere, which may proceed to implement its payload:
- Powessere may transfer pre-specified information about your PC to a remote server. Your OS version, UUID and system architecture format is uploaded to allow other attacks to take place.
- Powessere may implement a backdoor vulnerability that allows third parties to take control over your computer, including issuing unsafe system commands or browsing files.
- Powessere may install other threats with more specialized functions than its own, such as keyloggers, Trojan clickers or banking Trojans.
None of these attacks necessarily correlate to any visible symptoms. Powessere makes Registry modifications that can be detected through the Registry Editor, if necessary, but malware experts also warn that any unnecessary changes to the Registry could damage various programs or your overall operating system. In cases where Powessere installs multiple threats with heavy resource usage (such as a Bitcoin miner), you may be able to notice system slowdowns and software instability.
How to Tell when a Document Hides a Powessere Surprise
Powessere sometimes is installed through DOC, RTF and similar text files that include embedded vulnerabilities. Patching your software and deleting spam e-mail can provide the most obvious protection from these infection methods, and malware experts find that most competent anti-malware tools also can identify the Trojan droppers responsible for Powessere's distribution. Any suspicions about the legitimacy of e-mail messages with unusual attachments can be resolved by scanning the relevant files.
After an installation, Powessere may not show any visible signs of having compromised your computer. However, any PC with an open backdoor vulnerability is at extreme risk for suffering additional attacks, including collection of information or destruction of files. PCs suspected of suffering an attack by Powessere should be scanned with good anti-malware equipment, ideally from within Safe Mode if appropriate. Your anti-malware tools are likely to identify other threats while removing Powessere, unless you detect the attack close to its time of installation.
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.