Threat Database Trojans Backdoor:Win32/Unskal.C


By GoldSparrow in Trojans

Threat Scorecard

Ranking: 16,794
Threat Level: 80 % (High)
Infected Computers: 3
First Seen: April 3, 2015
Last Seen: July 11, 2023
OS(es) Affected: Windows

The Backdoor:Win32/Unskal.C malware falls in the category of backdoor trojans and is programmed to grant attackers remote access to infected computers. The Backdoor:Win32/Unskal.C malware can breach your system by using a corrupted text document attached to spam emails and it could be offered to you as an update to Java and Adobe Flash Player on pop-ups. The Backdoor:Win32/Unskal.C threat can place its executable in the system and user account folders of Windows and generate a random name. Hackers can use Backdoor:Win32/Unskal.C to manipulate, download and install software on your PC as well as log your keystrokes and extract your data. The Backdoor:Win32/Unskal.C trojan is known to use port 80 to communicate with its remote servers that hackers use to convey instructions to their malware. Moreover, the Backdoor:Win32/Unskal.C trojan can inject a key in your Windows Registry to auto-start with your operating system and evade detection by early warning systems. Computer users can boost their cyber protection by installing a trusted anti-malware application that detect and remove malware such as the Backdoor:Win32/Unskal.C.


Most Viewed