Home Malware Programs Trojans Win32/Powessere

Win32/Powessere

Posted: November 12, 2014

Threat Metric

Threat Level: 9/10
Infected PCs: 7
First Seen: November 12, 2014
Last Seen: July 16, 2019
OS(es) Affected: Windows

Powessere is a family of Trojan downloaders that download, as well as install additional malware to enable further attacks. Although Powessere Trojans also may conduct other, related activities that harm your computer, there are almost no common symptoms associated with Powessere infections. Because of its low visibility and the invasive nature of its payload, malware researchers saw fit to classify all variants of Powessere Trojans as high-level threats that should be removed by professional anti-malware tools.

Powessere: the Trojan with the Power to Multiply Your Problems

Powessere consists of a range of related Trojans largely identified in 2014 – although they may include well-known attacks that malware researchers have seen previously from other threats. Powessere sometimes is distributed in fake e-mail attachments of the same types that may be used in targeted attacks against corporate or government victims, but the general public also is at risk from infection via similar methods. The combined exploitation of JavaScript and PowerShell installs Powessere, which may proceed to implement its payload:

  • Powessere may transfer pre-specified information about your PC to a remote server. Your OS version, UUID and system architecture format is uploaded to allow other attacks to take place.
  • Powessere may implement a backdoor vulnerability that allows third parties to take control over your computer, including issuing unsafe system commands or browsing files.
  • Powessere may install other threats with more specialized functions than its own, such as keyloggers, Trojan clickers or banking Trojans.

None of these attacks necessarily correlate to any visible symptoms. Powessere makes Registry modifications that can be detected through the Registry Editor, if necessary, but malware experts also warn that any unnecessary changes to the Registry could damage various programs or your overall operating system. In cases where Powessere installs multiple threats with heavy resource usage (such as a Bitcoin miner), you may be able to notice system slowdowns and software instability.

How to Tell when a Document Hides a Powessere Surprise

Powessere sometimes is installed through DOC, RTF and similar text files that include embedded vulnerabilities. Patching your software and deleting spam e-mail can provide the most obvious protection from these infection methods, and malware experts find that most competent anti-malware tools also can identify the Trojan droppers responsible for Powessere's distribution. Any suspicions about the legitimacy of e-mail messages with unusual attachments can be resolved by scanning the relevant files.

After an installation, Powessere may not show any visible signs of having compromised your computer. However, any PC with an open backdoor vulnerability is at extreme risk for suffering additional attacks, including collection of information or destruction of files. PCs suspected of suffering an attack by Powessere should be scanned with good anti-malware equipment, ideally from within Safe Mode if appropriate. Your anti-malware tools are likely to identify other threats while removing Powessere, unless you detect the attack close to its time of installation.

Loading...