Icoscript
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Ranking: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
Threat Level: | 90 % (High) |
Infected Computers: | 92 |
First Seen: | October 31, 2014 |
Last Seen: | December 8, 2022 |
OS(es) Affected: | Windows |
Malware researchers have uncovered a very smart cyber-hacking technique that consists in the use of e-mail drafts as the Command and Control communication channel between hackers and the targeted computer. The hackers initiate the attack creating an unidentified Gmail account through which they may infect the aimed computer with a Trojan named Icoscript. After Icoscript installation, they will have the machine's control. From there on, the hackers will be able to perform innumerable actions, all against the computer user. Their commands will be concealed in modest Gmail drafts that may remain undetected until the computer users, noticing the unusual behavior presented by their machines, execute a deep scan on their computers and detect the presence of the Icoscript Trojan infection. It is crucial to exterminate Icoscript upon its detection. Removal of such Trojan infections demands a genuine and up-to-date anti-malware product that is skilled to deal with newly discovered techniques.
Submit Comment
Please DO NOT use this comment system for support or billing questions. For SpyHunter technical support requests, please contact our technical support team directly by opening a customer support ticket via your SpyHunter. For billing issues, please refer to our "Billing Questions or Problems?" page. For general inquiries (complaints, legal, press, marketing, copyright), visit our "Inquiries and Feedback" page.