Trojan.Hosts.5858 DescriptionBy using Trojan.Hosts.5858, criminals can scam inexperienced computer users with browser redirects while at the same time compromising the infected computer's security, potentially putting it under the control of malicious individuals. While Trojan.Hosts.5858 works together with other malware threats, this Trojan in particular is a browser hijacker. Basically, Trojan.Hosts.5858 is designed to divert online traffic in order to direct inexperienced computer users towards a scam website. Through this scam, criminals use Trojan.Hosts.5858 to obtain their victims' credit card information.
Trojan.Hosts.5858 Attack Involves Various Kinds of Malware Infections
Trojan.Hosts.5858 will take advantage of a preexisting malware infection known as the Backdoor.Andromeda Trojan. This malware infection opens up a backdoor into the infected computer system, a term commonly used to refer to an unauthorized opening in the infected computer system's security. By using this backdoor, much like a criminal can take advantage of an unguarded back door in order to enter someone's home, criminals can infect the victim's computer with various dangerous Trojan infections. Trojan.Hosts.5858 will rarely appear alone on a corrupted computer system. Trojan.Hosts.5858 will often be bundled with two other Trojans, an IRC bot (a malware infection designed to integrate the infected computer into a botnet so that it can be controlled from afar via IRC commands) and a spam bot Trojan (a Trojan designed to use the infected computer system to send out spam email, potentially spreading Trojan.Hosts.5858 to other computer systems).
How Trojan.Hosts.5858 Attacks Your Computer System
While there are many ways to cause browser redirects, some more intrusive than others, Trojan.Hosts.5858 goes as far as to change fundamentally how your computer system connects to the Internet. Basically, Trojan.Hosts.5858 makes changes to the HOSTS file, an important file contained in the System folder that is responsible for mapping a computer's connection to IP addresses. By changing how your computer system connects to websites, Trojan.Hosts.5858 can replace commonly-visited websites such as Google, Gmail and Facebook with its own malicious scam website. This malicious website will claim that your Internet access has been blocked, displaying a message entirely in German. Furthermore, this message will claim that the only way to regain access to the Internet is to provide your credit card details.
Infected with Trojan.Hosts.5858? Scan Your PC for FreeDownload SpyHunter’s Spyware Scanner
to Detect Trojan.Hosts.5858
Security Doesn't Let You Download SpyHunter or Access the Internet?
Solutions: Your computer may have malware hiding in memory that prevents any program, including SpyHunter, from executing on your computer. Follow to download SpyHunter and gain access to the Internet:
- Use an alternative browser. Malware may disable your browser. If you're using IE, for example, and having problems downloading SpyHunter, you should open Firefox, Chrome or Safari browser instead.
- Use a removable media. Download SpyHunter on another clean computer, burn it to a USB flash drive, DVD/CD, or any preferred removable media, then install it on your infected computer and run SpyHunter's malware scanner.
- Start Windows in Safe Mode. If you can not access your Window's desktop, reboot your computer in 'Safe Mode with Networking' and install SpyHunter in Safe Mode.
- IE Users: Disable proxy server for Internet Explorer to browse the web with Internet Explorer or update your anti-spyware program. Malware modifies your Windows settings to use a proxy server to prevent you from browsing the web with IE.
If you still can't install SpyHunter? View other possible causes of installation issues.
File System Details
Trojan.Hosts.5858 creates the following file(s):