Autospy is a program that hackers use to wreak havoc on a computer system. Programs like Autospy are particularly dangerous because they allow criminals with relatively low computer knowledge to perform attacks that were once only possible by hackers with advanced coding and hacking skills. Autospy belongs to a category of malware known as a RAT, or Remote Access Tool. As Autospy's name implies, Autospy allows a hacker to gain absolute control of a computer system from a remote location. According to ESG malware researchers, Autospy uses several quotes from Star Wars in Autospy's documentation and interspersed in Autospy's code.
Origins of Autospy
Autospy has several different versions, because many hackers have updated Autospy to bypass known security measures and to adapt Autospy to their own needs. Autospy was created before 2002 by a hacker that goes by the alias "Case". This Remote Access Tool quickly gained prominence throughout the year 2002. In the summer months of that year several variants of Autospy were released. Today, Autospy is not as used as other recent Remote Access Tools with graphical interfaces and even simpler operation.
How a Hacker Uses Autospy to Invade Your Computer System
Autospy usually takes advantage of a backdoor Trojan or worm. Autospy also has worm capabilities that allow Autospy to spread by itself, without the aid of other malware. Unlike other Remote Access Tools, Autospy is unique in that Autospy has a very well developed module for perpetrating credit fraud. Once a hacker manages to install Autospy on a victim's computer system, it is simply a matter of running different commands, in order to control the victim's computer at will. Basically, Autospy creates a server on the infected computer system (quite small, usually no larger than one megabyte in size) and then uses a client on the hacker's computer to control the infected computer system from afar.
Functions of the Autospy Remote Access Tool
Autospy grants a hacker complete control of a computer system. Some of Autospy's worst traits include the following:
- Using the "Kill" command, a hacker can delete any file on the infected computer system. Using the command "Deltree", a hacker can wipe out complete directories. Simply typing something like "deltree C:" is enough to wipe out the infected computer's entire hard drive.
- Several commands in Autospy also allow a hacker to view any fileor image, connect to any website or run any application on the infected computer system.
- Autospy also allows a hacker to display message boxes on the infected computer system or control several devices connected to the victim's computer.
- Worst of all, Autospy contains components that allow Autospy to spy on the victim's keystrokes and steal passwords and credit card information.
Do You Suspect Your PC May Be Infected with Autospy & Other Threats? Scan Your PC with SpyHunterSpyHunter is a powerful malware remediation and protection tool designed to help provide PC users with in-depth system security analysis, detection and removal of a wide range of threats like Autospy as well as a one-on-one tech support service. Download SpyHunter's FREE Malware Remover
Security Doesn't Let You Download SpyHunter or Access the Internet?Solutions: Your computer may have malware hiding in memory that prevents any program, including SpyHunter, from executing on your computer. Follow to download SpyHunter and gain access to the Internet:
- Use an alternative browser. Malware may disable your browser. If you're using IE, for example, and having problems downloading SpyHunter, you should open Firefox, Chrome or Safari browser instead.
- Use a removable media. Download SpyHunter on another clean computer, burn it to a USB flash drive, DVD/CD, or any preferred removable media, then install it on your infected computer and run SpyHunter's malware scanner.
- Start Windows in Safe Mode. If you can not access your Window's desktop, reboot your computer in "Safe Mode with Networking" and install SpyHunter in Safe Mode.
- IE Users: Disable proxy server for Internet Explorer to browse the web with Internet Explorer or update your anti-spyware program. Malware modifies your Windows settings to use a proxy server to prevent you from browsing the web with IE.
This article is provided "as is" and to be used for educational information purposes only. By following any instructions on this article, you agree to be bound by the disclaimer. We make no guarantees that this article will help you completely remove the malware threats on your PC. Spyware changes regularly; therefore, it is difficult to fully clean an infected machine through manual means.