Worm.AceBot

Acebot, also known as Worm.Win32.Newbiero.04, is a network worm that creates a backdoor through which a hacker can control your PC. Acebot spreads over open network shares. When it is executed, it will configure Windows to automatically run Acebot on startup. It will then connect to an IRC channel in order to receive commands from a remote attacker. This worm is designed to pass through several commercial firewall programs without detection. This worm is extremely dangerous, as it allows access to any sensitive personal and financial data stored on your PC.

Posted on August 24, 2007 in Worms

BestsellerAntivirus

BestsellerAntivirus screenshot

BestsellerAntivirus is a rogue antivirus program that is often downloaded and installed by Trojans, through browser security exploits, or via other nefarious mechanisms. BestsellerAntivirus launches on Windows startup and may generate excessive popup adverts. It will also display notifications of imaginary security risks in its attempts to get the user to purchase the full version. This program can be extremely difficult to remove manually, and will continue to try to recreate itself. This progarm is known to be affiliated with the Zlob/VideoAccess Trojan.

Posted on August 24, 2007 in Rogue Anti-Spyware Program

CheaterChecker

CheaterChecker screenshot

CheaterChecker is a spyware keylogger application. This application records every keystroke that you type on your computer, and hides itself from the user by running in stealth mode. CheaterChecker can be configured to automatically take screenshots at a preset time interval. It can be configured to log every web page that you visit and will also record all keystrokes that you type, as well as any instant messenger and email conversations. This program is a severe violation of your privacy and the safety of your personal and financial data, including banking information and credit card numbers.

Posted on August 24, 2007 in Keyloggers

Worm.Zhelatin.GQ

Zhelatin.GQ is an email worm that spreads its infection through spam email. Once the Zhelatin.GQ worm is installed onto the user’s system it will employ rootkit methods in order to conceal itself. The Zhelatin.GQ worm has the malicious ability to infect and send out emails to every email address that can be traced on the user’s computer. This is accomplished by adding the users PC to an IRC Botnet.

Posted on August 24, 2007 in Worms

Trojan.Agent-APH

Trojan.Agent-APH is designed to infiltrate your computer and steal personal information. This Trojan includes a keylogger which records every keystroke that you type. This malware is extremely dangerous, and poses a significant threat to the security of any personal and financial information stored on your computer.

Posted on August 24, 2007 in Trojans

Worm.Banwarum

Banwarum is a mass mailer worm that replicates itself onto other computers through email attachments. The worm will send emails to any emails that it can find on your PC. It will add itself as an attachment to these emails. It uses its own SMTP engine to send these messages. This worm is also known to spread through networks by exploiting the a Microsoft Windows ASN.1 Library Vulnerability. This worm will open a HTTP backdoor through which a hacker can access your PC.

Posted on August 24, 2007 in Worms

Bleah

Bleah is a virus that affects the system master boot record. This virus is extremely dangerous, and should be removed immediately.

Posted on August 24, 2007 in Viruses

Worm.Cholera

Cholera, aka Win32.CTX, is a polymorphic virus that affects Windows systems. This virus originates from Spain, and is similar to Marbug and Parvo viruses. This virus searches any .HTM, .TXT, .EML, .DBX, .MBX, .NCH, and .IDX files on your computer for email addresses. It then connects to your default SMTP server and transmits itself to any email addresses that it was able to locate.

Posted on August 24, 2007 in Worms

Virus.Elkern.c

Virus.Elkern.c is a virus that targets Windows users. Once installed into memory of the affected computer, Virus.Elkern.c will set itself to launch automatically every time you boot up Windows. Virus.Elkern.c will stay in memory and affect any processes that it files that do not have the word ‘explorer’ in their names.

Posted on August 24, 2007 in Viruses

Backdoor.SDBot

Backdoor.SDBot is a Trojan virus. Once installed on the computer, Backdoor.SDBot will allow remote attackers to control the compromised machine through the IRC network. Backdoor.SDBot also includes a self-updating feature and opens a large security vulnerability on the system. Backdoor.SDBot is a serious threat to personal and financial information.

Posted on August 24, 2007 in Backdoors

Virus.Elkern.a

Virus.Elkern.a is a virus that targets Windows computers. Once installed onto the affected computer system, Virus.Elkern.a will configure itself to load automatically every time you start Windows. Virus.Elkern.a will stay in memory and affect any processes that it finds that do not have the word ‘explorer’ in their names.

Posted on August 24, 2007 in Viruses

Worm.Klez

Klez is a mass mailer worm that replicates itself onto other computers through email attachments. The worm will send emails to any emails that it can find on your PC. It will add itself as an attachment to these emails. This worm is also known to spread through network shares.

Posted on August 24, 2007 in Worms

Email-Worm.VBS.Gedza

Gedza is a worm virus that spreads through email, network shares, P2P file sharing programs, and IRC. Once executed, Gedza will attempt to infect Word and Excel documents on your system with a VBS macro virus. This worm is known to cause frequent crashes. This virus may also display a JPG image of Avril Lavigne. Gedza will also display annoying messages, based on date. This virus is believed to originate from Spain.

Posted on August 24, 2007 in Worms

MalwareAlarm

MalwareAlarm screenshot

MalwareAlarm is a corrupt and misleading anti-spyware program. MalwareAlarm may be installed by a Trojan, through browser security exploits, or via questionable websites. Once installed, MalwareAlarm will run a scan on your computer and issue false warning messages claiming that your computer is infected with spyware. These false statements are only used to persuade you into buying the full version. Do not press the OK button from any of the warning messages that MalwareAlarm delivers because it will only redirect you to an unreliable website that promotes MalwareAlarm. MalwareAlarm is known to be a clone of SpySheriff.

Posted on August 22, 2007 in Rogue Anti-Spyware Program

ACXInstall

ACXInstall is a rogue ActiveX control that clandestinely enters the user’s system while visiting particular insecure websites. ACXInstall downloads dialer programs which are usually from pornographic websites and without the consent of the user. These dialers dial high cost phone numbers that usually connect to a compromised PC.

Posted on August 21, 2007 in Keyloggers