Win32.Worm.Mytob.C@mm
Posted: May 3, 2012
Threat Metric
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
Threat Level: | 2/10 |
---|---|
Infected PCs: | 30 |
First Seen: | May 3, 2012 |
---|---|
OS(es) Affected: | Windows |
Win32.Worm.Mytob.C@mm is a variant of the Win32/Zotob worm, and acquired especial notoriety for its 2005-era infection of CNN computers, temporarily interfering with CNN Live news services. Despite its age, Win32.Worm.Mytob.C@mm has still been confirmed to be in distribution by various means as of 2012, including being sent as a file attachment via spam e-mail messages (most likely via mass-mailing attacks that are coordinated by Win32.Worm.Mytob.C@mm itself). Although SpywareRemove.com malware experts have confirmed that Win32.Worm.Mytob.C@mm doesn't always cause visible symptoms, any potential Win32.Worm.Mytob.C@mm infection should be considered a high-level threat to your computer's security. Besides its standard worm functions, Win32.Worm.Mytob.C@mm also possesses characteristics of backdoor Trojans, and can attack your PC's security or grant criminals to dominate your PC from a remote server. Containing Win32.Worm.Mytob.C@mm and preventing Win32.Worm.Mytob.C@mm from distributing itself should always be one of your first priorities, after which you can isolate and delete Win32.Worm.Mytob.C@mm with a suitable anti-malware application.
Win32.Worm.Mytob.C@mm: an Expensive Blast from the Past
Even though Win32.Worm.Mytob.C@mm's most well-known attack occurred as far back as 2005, current estimates on spam e-mail attacks lead SpywareRemove.com malware researchers to note that as many as tens of thousands of Win32.Worm.Mytob.C@mm-infected e-mail messages may still be sent out on a daily basis. In this format, Win32.Worm.Mytob.C@mm is often received as an executable file attachment, and may be mislabeled to appear like a different file (such as a fake invoice notification as a .pdf file, for example). Because Win32.Worm.Mytob.C@mm's functions do include sending these types of spam by exploiting the resources of infected computers, Win32.Worm.Mytob.C@mm can be said, like many worms, to be adept at self-propagation.
SpywareRemove.com malware experts especially warn against any contact with a Win32.Worm.Mytob.C@mm-infected PC by means of local networks or removable drive devices, since worms like Win32.Worm.Mytob.C@mm can exploit either of these means to install themselves automatically onto fresh computers. Since typical losses for a network of company computers that are infected with Win32.Worm.Mytob.C@mm or another Zotob variant exceed ninety thousand dollars, containing Win32.Worm.Mytob.C@mm should always be considered an urgent priority. In spite of the potential for damage, the only confirmed symptom of a default Win32.Worm.Mytob.C@mm attack is a series of continuous system restarts or reboots. However, because Win32.Worm.Mytob.C@mm is configurable via a remote server, even this symptom isn't guaranteed to appear.
Why's Security Bypasses Should Be Your Security Concern
Win32.Worm.Mytob.C@mm's payload can include a variety of malicious functions that are typical of backdoor Trojans, in addition to plug-and-play exploits (that can be prevented by installing the relevant security patch from Microsoft). Some of the risks that Win32.Worm.Mytob.C@mm can pose include:
- Installing other types of malicious files, potentially including Trojans, rogue security software or spyware.
- Changing your Hosts file to block security-oriented websites.
- Recording your keyboard input via keylogging to steal personal information.
- Using your computer's resources for illegal acts, such as sending out Win32.Worm.Mytob.C@mm spam e-mail or launching DDoS attacks.
Since Win32.Worm.Mytob.C@mm is likely to infect related computers and create multiple copies of itself, SpywareRemove.com malware researchers suggest using anti-malware software to detect and remove Win32.Worm.Mytob.C@mm in its entirety, as manual deletion is impractical at best.
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.