Trojan.Wincod - Trojan Found! Popup

"Trojan.Wincod - Trojan Found!" Popup is a misleading warning notification issued by the rogue anti-spyware application known as Personal Antivirus. It states that the computer is unprotected and that the user should purchase and install Personal Antivirus to ensure full system protection. The "Trojan.Wincod - Trojan Found!" fake security alert reads as follows: "Trojan.Wincod - Trojan Found! Trojan.Wincod is a Trojan horse that displays message boxes and modifies settings on the compromised computer."

Posted on September 2, 2009 in Fake Error Messages

Trojan.Peskyspy Records Skype VoIP Conversations

Imagine you're having a discussion with your bank using Skype VoIP and a Trojan is recording every word you say from your name to your social security number! Well, now there's a computer Trojan horse called Trojan.Peskyspy that has the ability to do just that, record conversations via Skype VoIP (Voice over IP). It's not the first time that Trojans have been written to target Skype users but it's definitely the first time that a Skype Trojan has the ability to record Skype calls. Security experts have identified that Skype does not have any new vulnerability issues, but rather the Trojan.Peskyspy infection is able to listen to data traveling between the Skype processes and the audio device used for transmitting voice or sound. Swiss programmer Ruben Unteregger developed Trojan.Peskyspy and released the source code on his website...

Posted on September 1, 2009 in Computer Security

Trojan-Downloader.Win32.Bredolab.x

Trojan-Downloader.Win32.Bredolab.x is a dangerous trojan infection that is able to connect to a remote server for the purpose of downloading and installing malware. Once activated, Trojan-Downloader.Win32.Bredolab.x will attach itself to the svhost.exe making it very difficult, if not impossible, to manually detect and remove from your system. Trojan-Downloader.Win32.Bredolab.x may compromise your computer and disable system settings allowing a remote attacker to gain access to personal files or data stored on your hard drive.

Posted on September 1, 2009 in Trojans

Trojan.Peskyspy

Trojan.Peskyspy is a proof-of-concept trojan horse and is considered as the first 'wire-tap' Trojan. Trojan.Peskyspy allows an attacker to record and steal VoIP communications on a compromised computer. Trojan.Peskyspy has mainly targeted Skype, the most popular VoIP application in the world. Trojan.Peskyspy does not have the ability to spread to other PC's from an infected machine. Trojan.Peskyspy can go through Windows APIs, grab the audio streams and change them into .mp3 files. Trojan.Peskyspy then uses a backdoor to send the .mp3 files over a remote channel to a predetermined location.

Posted on September 1, 2009 in Trojans

Hooker Trojan Keylogger

Hooker Trojan Keylogger is a dangerous keylogging program that could compromise personal data or files stored on your system’s hard drive. Hooker Trojan Keylogger is able to map to a hard drive and allow a remote user to gain access in addition to recording keystrokes and internet activity. Once Hooker Trojan Keylogger is loaded into memory, it is able to stay resident in the background so it is undetected.

Posted on September 1, 2009 in Keyloggers

Trojan.Mdropper.AC

Trojan.Mdropper.AC is a malicious trojan horse that is able to map itself to the infected systems hard drives to download and initialize malware. Trojan.Mdropper.AC is part of a misleading threat result fabricated by the rogue anti-spyware program Personal Antivirus. Popup messages initiated by Personal Antivirus reads: "Trojan.Mdropper.AC - Trojan Found!".

Posted on September 1, 2009 in Trojans

Dbsinit.exe

Dbsinit.exe is a trojan file associated to the download and installation of the rogue anti-spyware programs Windows Police Pro and Windows Antivirus Pro. Dbsinit.exe may be executed at startup of Windows initiating the devious actions of Windows Police Pro or Windows Antivirus Pro. Manual detection and removal of Dbsinit.exe may be difficult to perform because it may load at startup of Windows.

Posted on September 1, 2009 in Trojans

Vista Antivirus 2010

Vista Antivirus 2010 is a rogue anti-spyware application. Vista Antivirus 2010 infiltrates the computer via security vulnerabilities and backdoors provided by affiliated trojans. Once active, Vista Antivirus 2010 is configured to start automatically, prompting the user to run a fake online scan. When this scan is complete, fabricated infection reports are displayed, usually intimidating the user into purchasing the rogue spyware remover Vista Antivirus 2010.

Posted on August 31, 2009 in Rogue Anti-Virus Program

"System is vulnerable to attacks"

"System is vulnerable to attacks" is a misleading warning notification issued by the rogue anti-spyware application known as Trust Ninja. It states that the computer is unprotected and that the user should purchase and install Trust Ninja to ensure full system protection. The "System is vulnerable to attacks" fake security alert reads as follows: "System is vulnerable to attacks. Attention: DANGER! TrustNinja detected that This PC NOT PROTECTED. Currently installed malware application cause: Annoying advertisements wasting your traffic. Slow page downloading speed. Web browser is not working properly Cyber thieves get access to credit card. Criminals will steal your personal data and photos. Hackers will get access to email box, personals, hosting and internet services. They will use your computer and IP address for illegal purposes....

Posted on August 31, 2009 in Fake Error Messages

Windows Police PRO

Windows Police PRO screenshot

Windows Police PRO is a rogue anti-spyware application. Its main objective appears to be persuading users to purchase and install its licensed version. Windows Police PRO achieves this goal by first infiltrating the computer using affiliated trojans without informed consent. Secondly, Windows Police PRO then begins displaying numerous popup system warnings and system tray alerts reporting viruses that can allegedly damage confidential data and deteriorate the system performance. Windows Police PRO also runs fabricated security scans that return false results full of spyware applications, trojans, worms and other malware. These are all used to mislead the user into purchasing this...

Posted on August 31, 2009 in Rogue Anti-Spyware Program

BlockDefense

BlockDefense screenshot

BlockDefense (also known as Block Defense) is a rogue anti-spyware application. Once BlockDefense has infiltrated the computer system, BlockDefense begins running a fake system scan that displays fictitious and sometimes grossly exaggerated infection results, along with fake security alerts, in order to fool the user into thinking the computer has been compromised. The user is then prompted to purchase and install BlockDefense in order to combat these threats. BlockDefense is a member of the family and a clone of

Posted on August 31, 2009 in Rogue Anti-Spyware Program

Gav.exe

Gav.exe is an executable file associated with the rogue anti-spyware application known as Green AV, and seeks to cause damage to the compromised computer, along with performance degradation and a decrease in speed. Remove as soon as possible.

Posted on August 31, 2009 in Spyware

Infamous Cybercriminal Agrees to Plead Guilty to TJX Hack

In 2007 it was discovered that one of the most famous department store chains in the United States, TJX Companies, Incorporated, had been the subject of a data breach that caused 45.7 million accounts to be compromised over nearly a two-year period. The one responsible for what some have called one of the largest known identity theft cases in U.S. history? Albert Gonzalez, a 28 year-old Miami native, who has finally agreed to plead guilty to all 19 counts of related charges against him. Not only was Gonzalez accused of helping to steal millions of credit and debit card details from TJX Companies, but also BJ's Wholesale Club, Boston Market, Barnes & Noble, OfficeMax, Sports Authority, DSW and Forever21. The charges put forward against Gonzalez consist of conspiracy, wire fraud, aggravated identity theft, and money laundering, which...

Posted on August 31, 2009 in Computer Security

W32.Nitomeivo

W32.Nitomeivo is a computer virus that spreads via email messages in the form of an executable file. Once activated, W32.Nitomeivo begins infecting other executable files in the form of .exe and .scr. W32.Nitomeivo may also overwrite system files on the infected machine.

Posted on August 31, 2009 in Viruses

Stop-Spyware.net

Stop-Spyware.net is a browser hijacker promoting the rogue anti-spyware application called Spyware Crusade. Due to affiliated trojans infiltrating the computer via security exploits and modifying the browser settings, web-surfing activities are redirected to the Stop-Spyware.net domain. Here the computer is subject to a fake online scan that displays fictitious and often grossly exaggerated infection results, all in order to intimidate the user into purchasing the fake spyware remover Spyware Crusade.

Posted on August 31, 2009 in Rogue Websites