This is a trojan horse program, it is designed to covertly infiltrate your computer and open up a backdoor. If it is successful it will allow a remote hacker to gain full control over your machine and all information stored on it.
Trojan.BHO.d is designed to covertly infect your system (it is usually presented as a Browser Helper Object), generating numerous popup advertisements. Additionally, it will monitor and analyze all websites you visit in order to match the advertisements it displays to your taste. It may also hijack your browser to specific web pages based your browsing habits.
Trojan.Rbot-BBQ is a Trojan designed to open up a backdoor on the computer it infects allowing access to malicious individuals. Additionally the Trojan downloads even more malware onto the victim machine. All-in-all the Trojan can cause both leaks of sensitive information to remote hackers and serious system instability or failures.
ICQ Boom is AOL spyware that exploits the security vulnerabilitiesof AOL, aiming ICQ hacks and DoS attacks at AOL users. ICQ Boom is also known to steal passwords and personal information data pertaining to AOL users and their messenger accounts (AIM).
Spector is a keylogger which monitors the user’s keystrokes without the user’s knowledge or consent. By monitoring the user’s keystrokes, the attacker has access to the user’s online activity which includes sensitive personal information such as passwords, credit card numbers, bank account numbers, emails, chat room conversations and websites visited. Spector stores the logs in “%SystemDir%\netext\”.
SpyHunter Spyware Definitions Update: v.6.62 (10/12/2007) SpyHunter Latest Program Update: v.2.9.5018 New spyware appear almost every day. Updating your SpyHunter regularly can protect you against newly released spyware, adware, worms, trojans and other malicious threats. To use SpyHunter’s Instant Definition Update , which provides the latest spyware definition updates and other program updates, go to SpyHunter > Update > Definitions Update . Our Advice: If you currently do not have SpyHunter, it is highly recommended you try SpyHunter’s Spyware Scanner . The following new parasites have been added to SpyHunter: The following parasite threats were updated: Trojan.Tibs Worm.Zhelatin.GQ Vixup.Trojan Trojan.Dropper-Delf Trojan-PSW.OnLineGames.vm...
This is a fake spyware removal application aimed at tricking the user into purchacing its payed version by repeatedly generating false system security alerts. The program is usually downloaded onto the victim machine by a trojan.
XP Antivirus is a corrupt anti-spyware application that may infiltrate your computer with the help of a Trojan via browser security loopholes. Once installed, XP Antivirus will perform a deceitful scan that will result in fake threat notifications. The notifications that XP Antivirus displays are false and are used by malicious hackers to profit from credible computer users. Exaggerated threat reports are meant to scare you into purchasing the full version of the program, which is also a fraud and cannot perform duties of a credible anti-spyware application. You should remove XP Antivirus from your system with no hesitation.
WebSpyShield is a rogue anti-spyware application that creates a browser toolbar and fake security warnings. It can be downloaded by other Trojans and/or browser security exploits. Also, when browsing the internet, you will be redirected to the WebSpyShield homepage.
This is a virus designed to propagate via open network shares. After an infected file is launched on the victim machine the virus scans the hard drive and infects all .exe files it comes across. Moreover, the virus may infect your computer with additional spyware or adware.
Email-Worm.Zafi is worm designed to spread via p2p networks and emails. Once run on your computer the worm opens a backdoor that allows a remote malicious individual to connect to you computer and gather up your personal information.
Email-Worm.Erkez.F is a mass-mailing worm designed to spread through computer networks by exploiting security holes on machines connected to the Internet. Once it is executed on your machine, Email-Worm.Erkez.F will continue to propagate itself by sending its copies to email addresses gathered from your PC. Occasionally Email-Worm.Erkez.F may download additional malware onto your computer. In addition, Email-Worm.Erkez.F may cause a sluggish performance of your computer. It is recommended to remove Email-Worm.Erkez.F from your machine as soon as possible.
Email-Worm.Erkez.D is an e-mail worm that is capable of self-replication. It can be caught when opening suspicious e-mails, downloading unknown e-mail attachments or using internet file sharing networks. Email-Worm.Erkez.D may change security settings, disable firewalls and even stop antivirus software from working. Your computer may also be remotely hijacked when infected with Email-Worm.Erkez.D, allowing someone else to control various processes of the machine. Email-Worm.Erkez.D is a very high risk parasite to any personal or financial information.
Trojan-PSW.OnLineGames.bs is a Trojan designed to acquire any stored login or password information. It is known to steal online gaming accounts as well as financial information. Trojan-PSW.OnLineGames.bs then sends the stolen content to a remote server.
Trojan-PSW.WOW is a nasty Trojan application designed to log all your keystrokes and scan your hard disk for all the passwords that you store there. Trojan-PSW.WOW then sends all the collected information to its creators. Trojan-PSW.WOW mostly tends to steal online gaming (especially “World Of Warcraft”) and banking passwords. In order to have your system safe, it’s recommended to get rid of Trojan-PSW.WOW immediately.