Threat Database Trojans Trojan Horse Patched_c LYU

Trojan Horse Patched_c LYU

By GoldSparrow in Trojans

Threat Scorecard

Threat Level: 90 % (High)
Infected Computers: 11
First Seen: July 10, 2012
Last Seen: February 18, 2022
OS(es) Affected: Windows

As you probably guessed or surmised, having Trojan Horse Patched_c_LYU on your system is not a good thing but rather it means your machine is infected with a Trojan and malicious program. Trojan Horse Patched_c_LYU and sibling Trojan Horse Patched_c_LYT are tag teaming to wreak havoc on poorly protected Windows-based systems. The carefully planned attack involved Trojan Horse Patched_c_LYU acting as mailman or delivery agent and carrying inside or dropping Trojan Horse Patched_c_LYT. Point of entry may have been made possible through a guise, and thus fake Adobe Flashed update or video codec component used to view a movie. Trojans along with other malware agents are peppered throughout the Internet, and one wrong link or landing could be disastrous in the end.

Between the two villains, one is being used to open a backdoor to allow a hacker remote access and secret use of system resources to order up a DNS strike or distribute malware. Additionally, a port will be opened to communicate successes, i.e. implantation or theft of vital data, transmit stolen data and to intercept download of more malicious programs. Both are without an interface and are meant to work resident in the background. Problematic will be the inability to depend on your weak anti-virus tools that Trojan Horse Patched_c_LYU swiftly deactivated. You can also expect difficulty in using administrative controls like Task Manager, also disabled and made unavailable. If you've been having difficulty accessing websites and forums offering a malware removal solution, attribute it to the nasty crew, Trojan Horse Patched_c_LYU and his brother Trojan Horse Patched_c_LYT. Unless you have all day, night, weeks or months to play hide-and-go-seek with these Trojans, you should bring in the big gun – a stealth anti-malware loaded with an anti-rootkit component and able to go where no man should go, and many weak anti-virus programs do not go. Otherwise, you could easily overlook a malicious file or component and allow the attack to rejuvenate as planned, each time you reboot.

Trending

Most Viewed

Loading...