Backdoor.Darkmoon

Backdoor.Darkmoon is a backdoor Trojan that can unnoticeably operate in a system and give attackers remote access to the system. Backdoor.Darkmoon is able to open a conduit allowing attackers to download malicious files onto an infected system. Backdoor.Darkmoon may also have keylogging capabilities that will put a victim's confidential information at risk of Identity Theft.

Posted on December 9, 2009 in Backdoors

Generic Downloader.x!bur

Generic Downloader.x!bur is a malicious Trojan that is often distributed via spam mail. Generic Downloader.x!bur may also enter a user's machine through the exploitation of software and security vulnerabilities. Generic Downloader.x!bur is able to download and execute harmful files by communicating with a remote server. If detected, Generic Downloader.x!bur should be exterminated immediately.

Posted on December 8, 2009 in Trojans

Ransom-O

Ransom-O is a Trojan program that spreads in the form of a spam e-mail attachment. Once executed, Ransom-O will attempt to block a victim's internet access and disrupt the normal operation of the system. The victim will then be informed that the only way to re-enable internet access is to pay with a SMS. Ransom-O is a security threat that can harm your computer system.

Posted on December 8, 2009 in Trojans

Backdoor.Hupigon.EQZD

Backdoor.Hupigon.EQZD is a Trojan that downloads unsolicited files onto an infected computer. Backdoor.Hupigon.EQZD enters users' systems by exploiting security holes and installing itself without a user's knowledge or permission. Backdoor.Hupigon.EQZD may also shut down certain Kaspersky products via program bugs. Backdoor.Hupigon.EQZD is a dangerous threat to your PC and must be removed promptly.

Posted on December 8, 2009 in Backdoors

Backdoor.Havar.S

Backdoor.Havar.S is a backdoor Trojan that can give an unauthorized user access to an infected machine. Backdoor.Havar.S is able to surreptitiously run in a system and give a remote attacker partial control over a compromised machine. Backdoor.Havar.S may download other dangerous programs onto a machine and put a victim's system at risk of further damage.

Posted on December 8, 2009 in Backdoors

Adware-BDSearch.sys

Adware-BDSearch.sys is a program that displays potentially unwanted advertisements on a compromised machine. Adware-BDSearch.sys is not necessarily a malicious program and can be purposefully installed by an authorized administrator. Adware-BDSearch.sys may come bundled with other applications and gather certain information from an infected machine. Adware-BDSearch.sys can be uninstalled with security software or manually.

Posted on December 8, 2009 in Adware

Trojan-Downloader.Win32.Mufanom.bsv

Trojan-Downloader.Win32.Mufanom.bsv is a malicious program that surreptitiously enters users' systems via browser security holes or drive-by downloads. Trojan-Downloader.Win32.Mufanom.bsv is a security threat that is able to download contaminated files onto a compromised PC. Removing Trojan-Downloader.Win32.Mufanom.bsv and other parasites with a good security tool, is the best thing you can do for an infected PC.

Posted on December 8, 2009 in Trojans

Worm.Agobot.WOPW

Worm.Agobot.WOPW is a dangerous worm that spreads across different computer networks with weak passwords. Worm.Agobot.WOPW is able to secretly run in the background of a system and open a backdoor to it. Worm.Agobot.WOPW may also disable certain anti-virus software settings. Worm.Agobot.WOPW can make a system vulnerable to other malware attacks, putting a victim's private data at risk of being stolen.

Posted on December 8, 2009 in Worms

Adware.Purityscan

Adware.PurityScan is a dangerous infection that is thought to have originated in China. This country is currently leading the world in harboring computer hackers, criminals, and fraudsters. Adware.PurityScan belongs to a category of malicious software known as adware. The main point of an adware is filling up your computer with annoying advertisements, in the form of pop-up windows. To do this, Adware.PurityScan scans your browsing history, cache, and temporal files looking for adult websites or related content. Then Adware.PurityScan will connect to the Internet to retrieve numerous advertisements matching your browsing habits according to what Adware.PurityScan scanned. Adware.PurityScan seldom comes alone. Adware.PurityScan is usually accompanied by a rogue anti-spyware program. That is, a harmful application disguised like a...

Posted on December 8, 2009 in Adware

AntiTroy

AntiTroy screenshot

AntiTroy is a misleading security application that is distributed with the help of a Trojan. The Trojan infiltrates vulnerable systems and creates harmless files. Once inside a system, AntiTroy will conduct a system scan where the harmless files will be detected as malicious malware. AntiTroy will also display alarming virus alerts and pop-ups in order to scare a victim even more. The victim will then be advised to purchase the "licensed version" of AntiTroy. AntiTroy is not a legitimate security tool and it should be removed as soon as it is detected. AntiTroy belongs to the family and has many clones. AntiTroy clones include

Posted on December 8, 2009 in Rogue Anti-Spyware Program

Updatevp.org

Updatevp.org is a malicious domain promoted via Skype in the form of a legitimate security notification. Cyber-criminals fabricated a profile with the username "Online Notification", to send out messages with a bogus system scan report. The report reveals that your system is infected and vulnerable, then it advices you to download a patch from Updatevp.org. "Online Notification" and Updatevp.org are part of an online scam to trick victims out of their money.

Posted on December 8, 2009 in Rogue Websites

Dropper/Xema.22528.AK

Dropper/Xema.22528.AK is a Trojan that may drop harmful parasites onto a compromised PC. Dropper/Xema.22528.AK may provide an attacker with remote access to a system, putting a victim's private information at risk of being stolen. Dropper/Xema.22528.AK may access a user's system via drive-by downloads or contaminated websites. The immediate removal of Dropper/Xema.22528.AK is recommended.

Posted on December 7, 2009 in Trojans

RogueAntiSpyware.SecurityToolFraud

RogueAntiSpyware.SecurityToolFraud is an application that displays fake system security alerts on a compromised computer. RogueAntiSpyware.SecurityToolFraud is used by cyber-criminals to trick users into thinking that their computers are infected. Following the fake security notifications a user will be advised to purchase a bogus anti-spyware application in order to remove all the malware detected on the system. RogueAntiSpyware.SecurityToolFraud is a misleading application that can be automatically removed with security software.

Posted on December 7, 2009 in Rogue Anti-Spyware Program

Net-Worm.Win32.Kolab.dqe

Net-Worm.Win32.Kolab.dqe is a worm that spreads itself across network shares by exploiting weak passwords. Net-Worm.Win32.Kolab.dqe is able to steal confidential information from an infected machine and download more parasites onto the system. Net-Worm.Win32.Kolab.dqe may also slow down a computer's operation by corrupting certain stored data and utilizing available hard disk space.

Posted on December 7, 2009 in Worms

Trojan.Adclicker

Trojan.Adclicker is a Trojan horse program designed to generate illegitimate traffic to specific websites. Trojan.Adclicker can be used by malicious users to simulate clicks on pay-per-click adverts, or to increase web counter statistics. Trojan.Adclicker utilizes HTTP (Hypertext Transfer Protocol) requests to accomplish its tasks. Trojan.Adclicker can be easily removed from a system with a reliable security application.

Posted on December 7, 2009 in Trojans