BKDR_PCCLIEN.BQD
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Ranking: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
Threat Level: | 80 % (High) |
Infected Computers: | 1 |
First Seen: | December 21, 2011 |
Last Seen: | December 1, 2020 |
OS(es) Affected: | Windows |
BKDR_PCCLIEN.BQD is a kind of Trojan known as a backdoor Trojan. Backdoor Trojans are designed to open up a hole in the targeted computer system's security through which a remote application can gain access to the infected computer system. A hacker can take advantage of this backdoor in order to install malware onto the victim's computer system. The amount of the harm that BKDR_PCCLIEN.BQD can cause to an infected computer system is entirely dependent on the malware installed through BKDR_PCCLIEN.BQD's backdoor. Because of this, PC security researchers regard infections like BKDR_PCCLIEN.BQD as having an extreme damage potential. BKDR_PCCLIEN.BQD is not destructive in itself. Rather, this malware infection enables hackers to install harmful malware onto a computer system. Because of this, ESG security researchers strongly recommend running a full scan of your hard drives if you suspect that you have become infected with BKDR_PCCLIEN.BQD. BKDR_PCCLIEN.BQD is designed to delete itself once the backdoor has been established. However, a reliable anti-malware program should be able to detect the security vulnerabilities created by BKDR_PCCLIEN.BQD on a compromised computer system.
BKDR_PCCLIEN.BQD and Kim Jong II
Without a deep scrutiny, it will be hard to find a connection between a malware infection and the deceased North Korean dictator Kim Jong II. However, there is actually a close connection. This is because BKDR_PCCLIEN.BQD is installed onto the victim's computer with the help of TROJ_ARTIEF.AEB. This malware infection uses a security vulnerability in Acrobat Reader 9 in order to install BKDR_PCCLIEN.BQD, which in turn allows a criminal to infect the victim's computer with a variety of malware. The initial infection is caused by a scam email claiming to contain information about Kim Jong II's death. This information is supposedly contained in a PDF file, often with a PDF extension, although it may also be disguised as a DOC file. Once the victim downloads this file attachment, it will display a PDF file containing a picture and some basic facts about Kim Jong II. However, this is merely a cover for this malicious file's true intent; to install BKDR_PCCLIEN.BQD onto the victim's computer. A BKDR_PCCLIEN.BQD infection will usually display no symptoms, since it is in the hackers' best interest that this infection remains undetectable. Because of this, maintaining your security software fully updated and avoiding unsolicited email attachments and embedded links is crucial if you want to guard your computer system against harm.
Submit Comment
Please DO NOT use this comment system for support or billing questions. For SpyHunter technical support requests, please contact our technical support team directly by opening a customer support ticket via your SpyHunter. For billing issues, please refer to our "Billing Questions or Problems?" page. For general inquiries (complaints, legal, press, marketing, copyright), visit our "Inquiries and Feedback" page.