Threat Database Trojans Trojan.Hosts.5858

Trojan.Hosts.5858

By GoldSparrow in Trojans

By using Trojan.Hosts.5858, criminals can scam inexperienced computer users with browser redirects while at the same time compromising the infected computer's security, potentially putting it under the control of malicious individuals. While Trojan.Hosts.5858 works together with other malware threats, this Trojan in particular is a browser hijacker. Basically, Trojan.Hosts.5858 is designed to divert online traffic in order to direct inexperienced computer users towards a scam website. Through this scam, criminals use Trojan.Hosts.5858 to obtain their victims' credit card information.

Trojan.Hosts.5858 Attack Involves Various Kinds of Malware Infections

Trojan.Hosts.5858 will take advantage of a preexisting malware infection known as the Backdoor.Andromeda Trojan. This malware infection opens up a backdoor into the infected computer system, a term commonly used to refer to an unauthorized opening in the infected computer system's security. By using this backdoor, much like a criminal can take advantage of an unguarded back door in order to enter someone's home, criminals can infect the victim's computer with various dangerous Trojan infections. Trojan.Hosts.5858 will rarely appear alone on a corrupted computer system. Trojan.Hosts.5858 will often be bundled with two other Trojans, an IRC bot (a malware infection designed to integrate the infected computer into a botnet so that it can be controlled from afar via IRC commands) and a spam bot Trojan (a Trojan designed to use the infected computer system to send out spam email, potentially spreading Trojan.Hosts.5858 to other computer systems).

How Trojan.Hosts.5858 Attacks Your Computer System

While there are many ways to cause browser redirects, some more intrusive than others, Trojan.Hosts.5858 goes as far as to change fundamentally how your computer system connects to the Internet. Basically, Trojan.Hosts.5858 makes changes to the HOSTS file, an important file contained in the System folder that is responsible for mapping a computer's connection to IP addresses. By changing how your computer system connects to websites, Trojan.Hosts.5858 can replace commonly-visited websites such as Google, Gmail and Facebook with its own malicious scam website. This malicious website will claim that your Internet access has been blocked, displaying a message entirely in German. Furthermore, this message will claim that the only way to regain access to the Internet is to provide your credit card details.

File System Details

Trojan.Hosts.5858 may create the following file(s):
# File Name Detections
1. %AllUsersProfile%\Local Settings\Temp\d446fffd.com
2. avg.exe
3. Autorun.inf

Trending

Most Viewed

Loading...