Threat Database Worms Win32.Worm.Coidung.B

Win32.Worm.Coidung.B

By Domesticus in Worms

Threat Scorecard

Threat Level: 50 % (Medium)
Infected Computers: 6
First Seen: November 15, 2011
Last Seen: January 29, 2020
OS(es) Affected: Windows

As of November of 2011, many computer users from all around the world have become infected with Win32.Worm.Coidung.B. While it is not uncommon to become infected with malware like Win32.Worm.Coidung.B from downloading pirated software, the criminals behind the recent batch of Win32.Worm.Coidung.B infections have taken a sneakier approach, tricking many computer users in the process. The typical way in which Win32.Worm.Coidung.B, a worm written in Visual Basic enters a computer system, is disguised as a popular download in torrent websites. However, criminals have started distributing Win32.Worm.Coidung.B through an online scam which promises to provide you with an application designed to check if your version of Windows is legitimate. This tool used to exist, but Microsoft discontinued it in December of 2010. So, basically, criminals are not only taking advantage of people that download pirated software, but of people that try to avoid pirated software to the point where they even use applications designed to make sure that there is none present on their computer system! This fake version of Microsoft's authenticity checker spreads through Instant Messenger, and is an updated version of a well-known online scam that used the same methods in 2006 and 2007 through AOL's instant messaging services.

Win32.Worm.Coidung.B has been associated with Virtob, a malware infection that can infect files on the victim's computer system. Virtob enhances the attack of Win32.Worm.Coidung.B by allowing Win32.Worm.Coidung.B to spread more effectively from one system to another. As soon as Win32.Worm.Coidung.B makes its way into the victim's operating system, Win32.Worm.Coidung.B disables the system's firewall and creates a security hole also known as a 'backdoor'. Using this unsecured backdoor, a hacker can gain access to the infected computer system and carry out a variety of malicious activities. Examples of ways in which criminals can take advantage of a backdoor established through the use of Win32.Worm.Coidung.B include the following:

  • A backdoor installed with Win32.Worm.Coidung.B can be used to install a remote access tool. Using this malicious program, a hacker can control the infected computer remotely, using it for a variety of illegal activities.
  • A Win32.Worm.Coidung.B backdoor can also be used to install spyware or a keylogger, in order to spy on the infected computer and steal the victim's data and personal information.
  • A malicious attacker can also simply delete all files on the infected system, or surreptitiously install a ransomware or malware specifically designed to wreak havoc on the infected computer system.

Trending

Most Viewed

Loading...