WormP2P.Tanked.Trojanv1.1
Posted: August 17, 2015
Threat Metric
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
Threat Level: | 9/10 |
---|---|
Infected PCs: | 63 |
First Seen: | August 17, 2015 |
---|---|
Last Seen: | January 21, 2022 |
OS(es) Affected: | Windows |
WormP2P.Tanked.Trojanv1.1 is a worm that uses the peer-to-peer technology to distribute itself, most frequently disguising its file as a premium software crack. Besides a variety of obfuscating defenses, WormP2P.Tanked.Trojanv1.1 also may implement backdoor attacks that may give third parties remote control over your computer, including being able to collect data or install new threats. For their part, malware researchers consider WormP2P.Tanked.Trojanv1.1 as a high-level threat, with deleting WormP2P.Tanked.Trojanv1.1 (and its backup copies) being a task to relegate to your best anti-malware applications.
WormP2P.Tanked.Trojanv1.1: A Hidden Cost to Gaming for Free
While the popularity of P2P torrent networks and associated 'free download' technology may make for happy software pirates, it does have some corresponding security drawbacks. One of the most noteworthy of these is the tendency for threatening software to install itself under the disguise of a crack or even a full-fledged pirated program. WormP2P.Tanked.Trojanv1.1 is a particularly clear example of this hazard and may include built-in functions for labeling extra copies of itself as cracks for popular programs and games, such as Grand Theft Auto, Splinter Cell, and WinZip.
Would-be gamers installing these fake files have their machines infected with WormP2P.Tanked.Trojanv1.1, which may modify the Registry for allowing WormP2P.Tanked.Trojanv1.1 to launch automatically. WormP2P.Tanked.Trojanv1.1's primary file disguises itself as a (hidden) Windows component, although, like all worms, WormP2P.Tanked.Trojanv1.1 may create multiple backups.
Besides its ability to self-procreate, WormP2P.Tanked.Trojanv1.1's functions may include:
- WormP2P.Tanked.Trojanv1.1's backdoor connection may allow third parties to access and collect information from your PC at will.
- WormP2P.Tanked.Trojanv1.1 may download and install other threats, such as dedicated banking Trojans or browser hijackers.
- WormP2P.Tanked.Trojanv1.1 may use Denial-of-Service or DoS attacks to flood a network with fake traffic. This attack may cause servers to exceed their capacity and crash.
- WormP2P.Tanked.Trojanv1.1 may update itself with new features.
Tanking a WormP2P.Tanked.Trojanv1.1 Infection
Many or all of WormP2P.Tanked.Trojanv1.1 's files may be unviewable in the Windows Explorer program. However, your firewall security products may detect WormP2P.Tanked.Trojanv1.1's network traffic and, ideally, block WormP2P.Tanked.Trojanv1.1 from installing any other threats. You always should prevent self-distributing threats like WormP2P.Tanked.Trojanv1.1 from compromising new PCs and malware experts especially advise avoiding any unnecessary, removable hard drives or network-based contact with other machines. Once WormP2P.Tanked.Trojanv1.1 is isolated, anti-malware products can scan your PC and delete WormP2P.Tanked.Trojanv1.1, which may include multiple copies of itself.
Any victims of this threat especially should be aware of WormP2P.Tanked.Trojanv1.1 automatically placing backups in the 'shared' folder of the Kazaa downloading program. This file placement lets WormP2P.Tanked.Trojanv1.1 infect new machines in the same manner as WormP2P.Tanked.Trojanv1.1 introduced itself to the first one, without any need for the victim to share or torrent WormP2P.Tanked.Trojanv1.1 intentionally.
WormP2P.Tanked.Trojanv1.1 is one of several members of its family (known as Tanked or Kwbot), but differentiates itself from other Tanked worms by using different file names and random network ports.
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.