Grum

Grum Description

Type: Adware

The Grum botnet was a vast network of computer systems infected with Trojans designed to send out spam email and to allow criminals to control infected computers from a remote location. At one point, Grum may have been responsible for up to thirty-five percent of all of the world's spam email. Fortunately, law enforcement officials in The Netherlands, Panama and the Russian Federation, with the help of PC security researchers, have shut down Grum's command and control servers, which were located in those countries. Although Grum-related Trojans are still found in the wild and can cause various symptoms on infected computers, the fact that these command and control servers aren't active anymore is a significant blow to the operations of the criminals behind the Grum.

The Grum was set up so that Grum could send out massive amounts of email spam from hundreds of thousands of infected computers all around the world. Basically, the criminals behind the Grum used a variety of Trojans with the goal of infecting computer systems and forcing them to connect to the Grum. From there, these computer systems could be controlled remotely in order to send out spam email messages. By coordinating millions of computers at once, criminals could use the Grum to send out impressive amounts of email spam. The Grum in its earliest versions had been active since 2008 and quickly took the place of other botnets, such as Rustock, that were disabled thanks to law enforcement operations. Fortunately, thanks to the efforts of PC security analysts all around the world, the amount of spam email messages advertising cheap sexual enhancers and shady online businesses will be greatly reduced in the future.

Malware Associated with Grum

With the Grum disabled, Trojans associated with this botnet will remain on the victims' computer systems but will have no way of sending out spam email. This happens because they will not be able to communicate with their command and control servers, which have been shut down. While some symptoms from software conflicts and performance issues may present themselves, shutting down the Grum effectively neutralizes its associated malware. The Trojans associated with the Grum go by various names, including Trojan.Win32.Buzus.cqit, Tedroo, Win32/Injector.AJF, a href="/infostealerbankerc-removal/" title="Remove Infostealer.Banker.C">Infostealer.Banker.C, TROJ_BUZUS.BKM and many others, depending on the brand of anti-malware software used to detect them. The main purpose of these Trojans is to send out spam email by receiving email addresses from a command and control server and then using SMTP servers in order to send out email spam to these contacts.

Site Disclaimer

Enigmasoftware.com is not associated, affiliated, sponsored or owned by the malware creators or distributors mentioned on this article. This article should NOT be mistaken or confused in being associated in any way with the promotion or endorsement of malware. Our intent is to provide information that will educate computer users on how to detect, and ultimately remove, malware from their computer with the help of SpyHunter and/or manual removal instructions provided on this article.

This article is provided "as is" and to be used for educational information purposes only. By following any instructions on this article, you agree to be bound by the disclaimer. We make no guarantees that this article will help you completely remove the malware threats on your computer. Spyware changes regularly; therefore, it is difficult to fully clean an infected machine through manual means.