Trojan.Cossta
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Ranking: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
Threat Level: | 80 % (High) |
Infected Computers: | 8 |
First Seen: | January 19, 2011 |
Last Seen: | April 18, 2022 |
OS(es) Affected: | Windows |
Trojan.Cossta is a threat that may infect your PC, regardless of what Windows version is your Operating System (OS)'s choice. Since the best course of action is never to install these harmful applications, you need to know how they may travel across the cyberspace. Trojans may arrive when the user opens a corrupted email attachment or download compromised software. Trojan.Cossta is no exception to the rule, so you should be very vigilant when you receive files from unknown senders. The operators of this threat may use it to collect information. A very harmful feature of Trojan.Cossta is that it works without providing visible signs of its presence, although Trojan.Cossta may affect various parts of the OS. This way, computer users may assume their system is clean wrongly while the parasite uploads their files to Command and Control (C&C) servers.
These servers are the machines used by con artists to execute the attack. Any information that is sent there may become a possession of the hackers. Trojan.Cossta may edit some existing registry keys and also may create a few additional entries. These modifications may make Trojan.Cossta really hard to remove, and at the same time allow it to run at all times. In addition to the files that are on your hard disks, this Trojan also may obtain your online passwords. It goes without saying that the most severe consequences will happen if the culprits obtain the passwords for your financial accounts – once they take your money, you may be unable to receive a refund. To grant itself a sustainable presence, Trojan.Cossta may block some other programs and features. If you notice anything abnormal, you should immediately conduct a system scan with professional security software to make sure this threat isn't collecting your data.
Submit Comment
Please DO NOT use this comment system for support or billing questions. For SpyHunter technical support requests, please contact our technical support team directly by opening a customer support ticket via your SpyHunter. For billing issues, please refer to our "Billing Questions or Problems?" page. For general inquiries (complaints, legal, press, marketing, copyright), visit our "Inquiries and Feedback" page.