Autospy

Autospy Description

Autospy is a program that hackers use to wreak havoc on a computer system. Programs like Autospy are particularly dangerous because they allow criminals with relatively low computer knowledge to perform attacks that were once only possible by hackers with advanced coding and hacking skills. Autospy belongs to a category of malware known as a RAT, or Remote Access Tool. As Autospy's name implies, Autospy allows a hacker to gain absolute control of a computer system from a remote location. According to ESG malware researchers, Autospy uses several quotes from Star Wars in Autospy's documentation and interspersed in Autospy's code.

Origins of Autospy

Autospy has several different versions, because many hackers have updated Autospy to bypass known security measures and to adapt Autospy to their own needs. Autospy was created before 2002 by a hacker that goes by the alias "Case". This Remote Access Tool quickly gained prominence throughout the year 2002. In the summer months of that year several variants of Autospy were released. Today, Autospy is not as used as other recent Remote Access Tools with graphical interfaces and even simpler operation.

How a Hacker Uses Autospy to Invade Your Computer System

Autospy usually takes advantage of a backdoor Trojan or worm. Autospy also has worm capabilities that allow Autospy to spread by itself, without the aid of other malware. Unlike other Remote Access Tools, Autospy is unique in that Autospy has a very well developed module for perpetrating credit fraud. Once a hacker manages to install Autospy on a victim's computer system, it is simply a matter of running different commands, in order to control the victim's computer at will. Basically, Autospy creates a server on the infected computer system (quite small, usually no larger than one megabyte in size) and then uses a client on the hacker's computer to control the infected computer system from afar.

Functions of the Autospy Remote Access Tool

Autospy grants a hacker complete control of a computer system. Some of Autospy's worst traits include the following:

  • Using the "Kill" command, a hacker can delete any file on the infected computer system. Using the command "Deltree", a hacker can wipe out complete directories. Simply typing something like "deltree C:" is enough to wipe out the infected computer's entire hard drive.
  • Several commands in Autospy also allow a hacker to view any fileor image, connect to any website or run any application on the infected computer system.
  • Autospy also allows a hacker to display message boxes on the infected computer system or control several devices connected to the victim's computer.
  • Worst of all, Autospy contains components that allow Autospy to spy on the victim's keystrokes and steal passwords and credit card information.

Do You Suspect Your Computer May Be Infected with Autospy & Other Threats? Scan Your Computer with SpyHunter

SpyHunter is a powerful malware remediation and protection tool designed to help provide users with in-depth system security analysis, detection and removal of a wide range of threats like Autospy as well as a one-on-one tech support service. Download SpyHunter's FREE Malware Remover*

Site Disclaimer

Enigmasoftware.com is not associated, affiliated, sponsored or owned by the malware creators or distributors mentioned on this article. This article should NOT be mistaken or confused in being associated in any way with the promotion or endorsement of malware. Our intent is to provide information that will educate computer users on how to detect, and ultimately remove, malware from their computer with the help of SpyHunter and/or manual removal instructions provided on this article.

This article is provided "as is" and to be used for educational information purposes only. By following any instructions on this article, you agree to be bound by the disclaimer. We make no guarantees that this article will help you completely remove the malware threats on your computer. Spyware changes regularly; therefore, it is difficult to fully clean an infected machine through manual means.

Leave a Reply

Please DO NOT use this comment system for support or billing questions. For SpyHunter technical support requests, please contact our technical support team directly by opening a customer support ticket via your SpyHunter. For billing issues, please refer to our "Billing Questions or Problems?" page. For general inquiries (complaints, legal, press, marketing, copyright), visit our "Inquiries and Feedback" page.