Backdoor.Tidserv is a malicious backdoor Trojan that allows criminals to gain access to the infected machine from a remote location. A backdoor is simply an opening in the infected computer’s security that allows criminals to gain unfettered access to it while bypassing the infected computer’s security measures, much like a robber can gain access to an unguarded building by using an open back door. Backdoor.Tidserv uses advanced rootkit techniques in order to avoid detection or removal. ESG security researchers have observed that Backdoor.Tidserv can cause browser redirects and erratic behavior. This browser hijacking component is commonly referred to as the ‘Google Redirect Virus‘ due to its propensity for derailing Google search result. ESG security researchers strongly recommend removing Backdoor.Tidserv with an advanced anti-malware solution with anti-rootkit capabilities. Backdoor.Tidserv is part of the infamous TDSS rootkit family and will often be identified by a variety of aliases, including such names as Backdoor:W32/TDSS, BKDR_TDSS, Win32/Alureon, Trojan-Dropper.Win32.TDSS, and Packed.Win32.TDSS.
Backdoor.Tidserv’s Dangerous Payload
Backdoor.Tidserv has a master boot record rootkit, making changes that allow this Trojan to load automatically when Windows starts up. Because of Backdoor.Tidserv’s advanced rootkit techniques, this automatic loading of Backdoor.Tidserv can bypass very stringent security measures on the victim’s computer system. Backdoor.Tidserv has the capacity to install malicious files, connect to a remote server and download or execute files, delete files on the infected computer, make changes to the Windows Registry, reconfigure itself, and make changes to the infected computer’s security that allow cybercrooks to gain illegitimate access to the infected machine.
How Can You Detect Backdoor.Tidserv?
Backdoor.Tidserv Removal Details
Backdoor.Tidserv has typically the following processes in memory:
Backdoor.Tidserv creates the following files in the system:
- %System%\TDSSpopup[RANDOM NUMBER].url
Backdoor.Tidserv creates the following registry entries:
- HKEY_LOCAL_MACHINE\SOFTWARE\TDSS\”type” = “popup”
- HKEY_LOCAL_MACHINE\SOFTWARE\TDSS\”serversdown” = “1″
- HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\tdssdata\”asubid” = “v2test7″
- HKEY_LOCAL_MACHINE\SOFTWARE\TDSS\”build” = “standart”
- HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\tdssdata\”affid” = “39″