Backdoor.NoteBot
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Ranking: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
Threat Level: | 60 % (Medium) |
Infected Computers: | 12 |
First Seen: | August 30, 2017 |
Last Seen: | April 10, 2019 |
OS(es) Affected: | Windows |
Backdoor.NoteBot is a detection name, which was given to threats that were released to computer users via spam emails, Web injects, exploit kits and fake software update packages. Backdoor.NoteBot is a Trojan that functions as a remote computer administration tool. The NoteBot Backdoor Trojan is a threat that allows a hacker to manipulate an infected device remotely. Usually, threats like the NoteBot Backdoor Trojan create an additional administrator account and hide it in the system. The hacker's account is connected to an open network port, and the Backdoor Trojan may not be required to run on the compromised machine. Cyber security analysts reported the discovery of NoteBot in the first week of August 2017, and it appears that the Trojan is using a custom code unlike many Trojans of the same class that are based on open-source code.
Analysis performed on the samples of Backdoor.NoteBot showed that the program is designed to run in the system background continuously. The NoteBot Backdoor Trojan was found to inject code into the Sticky Note desktop app baked into the latest versions of Windows. The Sticky Note app has Internet connectivity, and its data transmissions go through port 8080, which is a port that many legitimate programs use to access content on the Web and remote servers. AV scanners monitor traffic via port 8080, but the NoteBot Backdoor Trojan was found to use an encrypted channel, which may delay detection and prevent some security tools from being triggered. Additionally, the NoteBot Backdoor Trojan was detected to inject corrupted libraries in the Windows Explorer and enable a remote attacker to delete, move, edit and track files on the system. The elevated privileges that come with the NoteBot Backdoor Trojan granted an attacker the ability to install and run programs, as well as terminate processes listed in the Task Manager. Malware researchers stated that the NoteBot Backdoor Trojan was used in attacks on regular users primarily and it did not manage to infect too many users. It is best to make sure you have the latest security patches and updates installed, as well as disable the macros in your word processor. You can remove hidden administrator accounts created with threats like the NoteBot Backdoor Trojan and erase corrupted code with help from a credible anti-malware solution.
Submit Comment
Please DO NOT use this comment system for support or billing questions. For SpyHunter technical support requests, please contact our technical support team directly by opening a customer support ticket via your SpyHunter. For billing issues, please refer to our "Billing Questions or Problems?" page. For general inquiries (complaints, legal, press, marketing, copyright), visit our "Inquiries and Feedback" page.