LATENTBOT is a new backdoor Trojan that is used to carry out stealth attacks on specific, high- valued targets. LATENTBOT has become known as a particularly stealthy type of backdoor Trojan that has managed to stay hidden for an extraordinarily long time. LATENTBOT is particularly effective at covering its tracks and hiding from security applications on affected computers. LATENTBOT is practically unsurpassed in this regard. LATENTBOT has been detected on computers all around the world, including the United States, South Korea, the United Kingdom, Canada, Peru, Singapore, Poland, the United Arab Emirates and Brazil.
As of now, PC security researchers have not identified a common link between the different computers affected by LATENTBOT. This threat seems to infect computers from various differing industry sectors. However, it is apparent that LATENTBOT is designed to target computers in industry and business rather than focusing on individual computer users. This makes LATENTBOT attacks particularly more harmful than other threats since the potential for data loss, and espionage is much higher than the average infection.
How LATENTBOT may Infect a Computer
In most cases, LATENTBOT is spread using spam email campaigns. LATENTBOT is included as a corrupted email attachment that may deliver a Trojan downloader to the victim's computer. This Trojan downloader may deliver the LuminosityLink, a threatening RAT (Remote Access Trojan) to the victim's computer. RATs allow third parties to take control over a computer from a remote location. Using this RAT, con artists can install LATENTBOT on the victim's computer. LATENTBOT, unlike many other backdoor Trojans, is designed to run on newer versions of Windows. This means that LATENTBOT is not effective on Windows XP, Windows Vista or Windows Server 2008. Rather, LATENTBOT is designed to infect computers running Windows 7 and newer versions of this operating system.
LATENTBOT is Designed to Remain Undetected on the Victim's Computer
LATENTBOT uses a complex installation process that is designed to allow LATENTBOT to remain silent. The LATENTBOT installation process involves six stages that are meant to prevent computer security researchers from studying this threat. LATENTBOT is highly obfuscated, and its code is designed specifically to prevent its study by security researchers. LATENTBOT will also delete its data from the affected computer when it's no longer needed and hides its files and associated applications.
How LATENTBOT Carries out Its Attack
LATENTBOT is built using a modular design that allows LATENTBOT to receive specific upgrades and improvements that may add new features. LATENTBOT has the capacity to deliver other threats (LATENTBOT has been linked to the Pony threat), delete the victim's MBR (Master Boot Record) to ruin the affected computer, or collect banking information and online passwords. The first signs of LATENTBOT were first detected in 2013. However, LATENTBOT has been particularly effective at avoiding leaving traces on targeted computers. Fortunately, the fact that LATENTBOT has been around for such a long time has meant that security applications have become capable of detecting LATENTBOT. Security programs will rarely detect LATENTBOT under this name, but will observe its traces in the computer's memory, labeling it LATENTBOT as a 'generic threat.'
What to do When Infected with LATENTBOT
To deal with LATENTBOT, malware researchers recommend the use of a reliable, fully updated anti-malware application. All security software should be kept fully updated. New ways of detecting LATENTBOT, from studying its obfuscated code and updates, are released occasionally, and malware researchers are releasing new updates to combat any new modules released for these types of infections constantly.
Do You Suspect Your PC May Be Infected with LATENTBOT & Other Threats? Scan Your PC with SpyHunterSpyHunter is a powerful malware remediation and protection tool designed to help provide PC users with in-depth system security analysis, detection and removal of a wide range of threats like LATENTBOT as well as a one-on-one tech support service. Download SpyHunter's FREE Malware Remover
Security Doesn't Let You Download SpyHunter or Access the Internet?Solutions: Your computer may have malware hiding in memory that prevents any program, including SpyHunter, from executing on your computer. Follow to download SpyHunter and gain access to the Internet:
- Use an alternative browser. Malware may disable your browser. If you're using IE, for example, and having problems downloading SpyHunter, you should open Firefox, Chrome or Safari browser instead.
- Use a removable media. Download SpyHunter on another clean computer, burn it to a USB flash drive, DVD/CD, or any preferred removable media, then install it on your infected computer and run SpyHunter's malware scanner.
- Start Windows in Safe Mode. If you can not access your Window's desktop, reboot your computer in "Safe Mode with Networking" and install SpyHunter in Safe Mode.
- IE Users: Disable proxy server for Internet Explorer to browse the web with Internet Explorer or update your anti-spyware program. Malware modifies your Windows settings to use a proxy server to prevent you from browsing the web with IE.