Trojan.Agent.MNR
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Ranking: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
Threat Level: | 50 % (Medium) |
Infected Computers: | 15 |
First Seen: | December 10, 2013 |
Last Seen: | August 3, 2022 |
OS(es) Affected: | Windows |
Trojan.Agent.MNR is a threat that is designed to drop a BitCoin miner on the victim's computer. Security researchers consider that Trojan.Agent.MNR presents a serious threat to computers. Trojan.Agent.MNR is a Trojan dropper that drops several threats on the victim's computer, the most common of which is a BitCoin miner known as PUP.BitCoinMiner, associated with P2Pool, a BitCoin mining pool that has been linked to these kinds of attacks. If you suspect that you have been exposed to Trojan.Agent.MNR through one of the social engineering tactics associated with this threat, security researchers strongly recommend taking measures to protect your computer and remove all threats associated with Trojan.Agent.MNR immediately with a reliable security program.
Trojan.Agent.MNR is Linked to a Social Engineering Campaign
Security researchers have uncovered bogus versions of the Facebook Web page that is designed to trick inexperienced computer users into downloading threats. This bogus version of Facebook claims that victims need to update their YouTube Player or will offer computer users an update for Flash Player, both of which are extremely common threat delivery methods – in fact, fake Flash Player updates are so common that malware researchers strongly advise that computer users avoid them altogether and only update Flash Player by going to Adobe Systems' Web page directly. The fake update for flash is hosted on a domain ending in .pw with several bogus sub-domains. Once Trojan.Agent.MNR is installed, Trojan.Agent.MNR drops several compromised files which include the BitCoin miner mentioned above. Bitcoins are mined using a computer's processing power to solve algorithms. Instead of using their own resources, however, criminals are increasingly taking over the victim's computers to force them to mine Bitcoin, causing severe performance issues on affected computers.
Preventing Attacks Involving Trojan.Agent.MNR
To prevent threat attacks involving Trojan.Agent.MNR, security researchers strongly recommend avoiding domains ending with .pw because they are being used in threat campaigns more and more. You should always download updates for Flash Player and other media applications from the official website and never from pop-up windows or third parties. Finally, a reliable security program that is always fully up to date should be used at all time to protect your computer from attacks such as Trojan.Agent.MNR.
Submit Comment
Please DO NOT use this comment system for support or billing questions. For SpyHunter technical support requests, please contact our technical support team directly by opening a customer support ticket via your SpyHunter. For billing issues, please refer to our "Billing Questions or Problems?" page. For general inquiries (complaints, legal, press, marketing, copyright), visit our "Inquiries and Feedback" page.