Threat Database Trojans TrojanClicker:MSIL/FaceLiker

TrojanClicker:MSIL/FaceLiker

By GoldSparrow in Trojans

Threat Scorecard

Threat Level: 90 % (High)
Infected Computers: 69
First Seen: September 29, 2015
Last Seen: January 3, 2023
OS(es) Affected: Windows

The TrojanClicker:MSIL/FaceLiker is created to generate pay--per-click revenue for its developers and is used for click-fraud. The FaceLiker trojan may attempt to appear as a legitimate browser add-on to have unrestricted access to the Internet and might decrease your browser performance. The TrojanClicker:MSIL/FaceLiker malware is propagated by exploit kits like Angler and Neutrino as well as trojan downloaders like Lacam and Fadef. The FaceLiker trojan is known to install two files named tempscreen.exe and screenshot.lnk in the LocalAppData and startup folders to execute its operations and avoid raising suspicion. Additionally, the TrojanClicker:MSIL/FaceLiker uses port 53 and may change your DNS settings and redirect your Internet traffic via servers of advertisers to generate more revenue for its developers. The FaceLiker trojan has limited capabilities but should not be underestimated because it can download a binary from remote hosts and introduce threats like CryptoDefense and Ukash into your system. The threats mentioned before fall into the category of ransomware and the operators of TrojanClicker:MSIL/FaceLiker may claim a percentage of the ransom that victims pay. As stated above, TrojanClicker:MSIL/FaceLiker is used for click-fraud and users may see pop-up and pop-under windows opening in their browser without them clicking on ads. The FaceLiker trojan is difficult to detect because it utilizes code injection and may corrupt Internet Explore, Google Chrome and Mozilla Firefox as well some email clients. Therefore, you might want to incorporate a reputable anti-malware solution into your OS to prevent TrojanClicker:MSIL/FaceLiker from landing on your PC.

Trending

Most Viewed

Loading...