Posted: January 7, 2013
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
|January 7, 2013
|October 13, 2023
Win32/Spy.SpyEye.CA is a spyware Trojan that is used by attackers to capture data in various web browsers. Win32/Spy.SpyEye.CA steals private data such as login credentials from affected Internet users. To grab personal details, Win32/Spy.SpyEye.CA keeps track of the victim's browsing activities and gathers information entered by PC users. Then, Win32/Spy.SpyEye.CA enters the collected data into fake forms created by itself or retrieved from legal forms and sends it to a remote server, instead of the one they are meant to be transmitted. Win32/Spy.SpyEye.CA may also install a malicious toolbar on the hacked web browser and gain any data inserted into its web-forms.