Trojan.FakeFlash.A
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Ranking: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
Ranking: | 7,285 |
Threat Level: | 90 % (High) |
Infected Computers: | 1,327 |
First Seen: | March 13, 2014 |
Last Seen: | September 18, 2023 |
OS(es) Affected: | Windows |
Fake Flash Player updates are among the most common ways of distributing Trojans and other threats. Inexperienced computer users are convinced into downloading these types of fake Flash Player updates through a variety of social engineering tactics. Various security programs detect one of these types of infections like Trojan.FakeFlash.A which may be distributed through social engineering tactics on social media networks. Trojan.FakeFlash.A in particular is distributed through Facebook spam that tries to tempt computer users into clicking on corrupted links through the promise of a pornographic video. Malware experts strongly counsel PC users to use common sense and safe browsing techniques to avoid being fooled through these types of attacks.
The Facebook Strategy Linked to Trojan.FakeFlash.A
When a computer user is infected by a Trojan associated with Trojan.FakeFlash.A, Trojan.FakeFlash.A may use the victim's Facebook account to display Facebook posts and messages that are used by Trojan.FakeFlash.A to spread itself to other computers. Trojan.FakeFlash.A's spam will claim that there are private, raunchy videos of the affected account. Some of the messages used by Trojan.FakeFlash.A may use subject lines or sentences like '[user name] private video,' '[user name] naked video' or 'XXX private video,' taking names from the victim's Facebook friends list.
What Happens When You Click on Trojan.FakeFlash.A Messages?
Clicking on any of the messages or posts listed above, you are taken to a bogus YouTube website that may show that the video has millions of views. However, whenever the computer user tries to view the supposed 'video', an error message shows up. This message alleges that it is paramount to install an update for Flash Player. This supposed Flash Player update actually is Trojan.FakeFlash.A. When installed, Trojan.FakeFlash.A installs a Web browser plugin that takes over the victim's Facebook account in order to display additional Facebook spam and gain access to the victim's pictures and other privileged Facebook data.
Protect yourself from Trojan.FakeFlash.A. If you observe these types of suspicious messages on Facebook, it is important to avoid clicking on them. Notify your Facebook friends if their account is displaying the type of spam associated with a Trojan.FakeFlash.A infection or a similar social engineering threat like this one.
Submit Comment
Please DO NOT use this comment system for support or billing questions. For SpyHunter technical support requests, please contact our technical support team directly by opening a customer support ticket via your SpyHunter. For billing issues, please refer to our "Billing Questions or Problems?" page. For general inquiries (complaints, legal, press, marketing, copyright), visit our "Inquiries and Feedback" page.