Mal/VB-AD

By Domesticus in Backdoors

Threat Scorecard

Ranking: 8,075
Threat Level: 80 % (High)
Infected Computers: 2,421
First Seen: December 7, 2011
Last Seen: September 11, 2023
OS(es) Affected: Windows

Mal/VB-AD is a dangerous Trojan designed to infect a computer system and create a hole in that computer's security, also known as a 'backdoor.' Like most Trojans of its kind, Mal/VB-AD is nearly undetectable and the first symptom of an infection on your computer may be a notification from your anti-malware software. Mal/VB-AD is notoriously difficult to remove, and Mal/VB-AD is often associated with a rootkit element which protects Mal/VB-AD from detection. ESG security researchers strongly recommend maintaining your anti-malware software fully updated in order to prevent a Mal/VB-AD Trojan infection. One of the most common sources of a Mal/VB-AD Trojan infection is found in external memory devices, such as USB memories and memory storage cards. Simply plugging one of these devices onto your computer with AutoPlay enabled is enough to infect your computer system immediately. Once infected, your personal information can be accessed from a remote location. Even worse, the criminals behind Mal/VB-AD can use the backdoor Mal/VB-AD enables in order to install a RAT (Remote Access Trojan) onto your computer system. Using this kind of Trojan, a criminal can take control of your computer and use it from a remote location. This kind of infection gives a criminal the ability to gain access to your own files, install and delete software and use your computer as if sitting in front of its keyboard.

The Main Danger of a Mal/VB-AD Trojan Infection

As was mentioned before, a criminal can install a RAT onto your computer in order to control it from afar. While this is dangerous for your own personal data and computer's safety, this kind of action also has larger implications. Criminals will seldom settle for infecting a single computer; Mal/VB-AD can be used to take over thousands of computers. By using an IRC server and automated software, criminals can then send out commands to every single infected computer in order to use them in coordinated actions. These vast networks of infected computer systems working together are known as botnets (each infected computer is known as a bot or a drone). Using a bot net, criminals can send out extremely large quantities of spam emails, overload a specific server with thousands of simultaneous, repeated requests, participate in networks designed to launder money or hide other criminal activity such as child pornography or distribution of dangerous malware.

Trending

Most Viewed

Loading...