Downloader.Fostrem

Downloader.Fostrem is a trojan that utilizes an unpatched software vulnerability in a system in order to spread. Once active, Downloader.Fostrem may connect to a remote host and download additional malware onto the system. This can lead to computer performance degradation, a decrease in speed and further function loss.

Posted on July 16, 2009 in Trojans

W32.Pavsee.C

W32.Pavsee.C is a computer worm said to be related in the promotion and subsequent distribution of the rogue anti-spyware application known as Personal Antivirus. Once active on a computer, W32.Pavsee.C issues fake security alerts stating that the system is infected with a virus that contaminates .com and .exe files. These notifications are there to ensure that the user follows the prompts to purchase and download Personal Antivirus. It is best to avoid this avenue altogether, and so the removal of W32.Pavsee.C if extremely important.

Posted on July 16, 2009 in Worms

Bloodhound.Malautoit

Bloodhound.Malautoit is a trojan virus that spreads throughout local and network drives due to the common detection for malicious AutoIt compiled scripts. Bloodhound.Malautoit may also download additional malware onto the compromised computer, causing severe computer performance degradation and a decrease in speed.

Posted on July 16, 2009 in Trojans

Trojan.Win32.Pakes.nlx

Trojan.Win32.Pakes.nlx is a dangerous trojan virus that hijacks a computer as soon as it has infiltrated and installed itself onto the system. Once active, Trojan.Win32.Pakes.nlx opens a security-free backdoor in your system through which a large amount of adware and spyware can be filtered into the compromised machine without informed consent. In addition to this, Trojan.Win32.Pakes.nlx enables a remote unauthorized user to gain access to the computer and steal valuable personal and financial data information, leading to identity theft.

Posted on July 16, 2009 in Trojans

Bestscanpc.info

Bestscanpc.info is a browser hijacker promoting the distribution of the rogue anti-spyware application known as System Security 2009. Due to affiliated trojans infiltrating the computer via security exploits and modifying the browser settings, web-surfing activities are redirected to the Bestscanpc.info domain. Once here, the computer is subject to a fake online scan that displays fictitious and sometimes grossly exaggerated infection results, all in order to intimidate the user into purchasing the fake spyware remover System Security 2009.

Posted on July 16, 2009 in Rogue Websites

Mal/TDSSPack-G

Mal/TDSSPack-G is a malicious trojan virus that typically penetrates a computer system via security or browser exploits, going unseen once inside. Mal/TDSSPack-G then begins fulfilling its functions, further compromising the machine. Downloading and requesting files from the Internet without user permission, modifying some system settings that could cause negative impact on the overall system security state, while Mal/TDSSPack-G may create a registry entry that causes the parasite to begin running as soon as Windows starts-up. Most important to note, however, is that Mal/TDSSPack-G typically transmits valuable information such as personal and financial data, to a remote unauthorized user, while downloading additional malware onto the system.

Posted on July 16, 2009 in Trojans

Trojan.Win32.Monder.cqbi

Trojan.Win32.Monder.cqbi is a malicious trojan virus that typically penetrates a computer system via security or browser exploits, going unseen once inside. Trojan.Win32.Monder.cqbi then begins fulfilling its functions, further compromising the machine. Downloading and requesting files from the Internet without user permission, modifying some system settings that could cause negative impact on the overall system security state, while Trojan.Win32.Monder.cqbi may create a registry entry that causes the parasite to begin running as soon as Windows starts-up. Most important to note, however, is that Trojan.Win32.Monder.cqbi typically transmits valuable information such as personal and financial data, to a remote unauthorized user, while downloading additional malware onto the system.

Posted on July 16, 2009 in Trojans

Bloodhound.Exploit.213

Bloodhound.Exploit.213 is unintentionally installed onto a computer by visiting a web site that hosts infected advertisements. Bloodhound.Exploit.213 is a generic detection for malicious files that propagate by exploiting the JavaScript Function Stack Buffer Overflow vulnerability found in Adobe Reader. In addition to this, Bloodhound.Exploit.213 attempts to download more malware threats onto the infected computer.

Posted on July 16, 2009 in Trojans

W32.IRCBot

W32.IRCBot is a backdoor trojan that is typically spread via an infected email attachment. Unsuspecting users opening this attachment will find themselves immediately infected with this virus. Once active, W32.IRCBot attempts to connect to an IRC server and await commands from an unauthorized remote user, who will inevitably seek to take control of the infected computer.

Posted on July 16, 2009 in Backdoors

Win32.Virut.56

Win32.Virut.56 is a trojan that usually spreads by infecting .exe and .scr files on a computer and through network-shared resources. Originating from the Virut family of trojans, Win32.Virut.56 may prove incredibly difficult to remove. Win32.Virut.56 may in fact corrupt the operating system in Windows because it tends to infect most of the system files, and cleaning has proven ineffective.

Posted on July 16, 2009 in Trojans

Downloader.Generic_c.AHI

Downloader.Generic_c.AHI is yet another variant originating from the Generic Downloader family, and should thus be taken very seriously. Downloader.Generic_c.AHI typically spreads via email, malicious or hijacked web pages, Internet Relay Chat (IRC) and peer-to-peer (P2P) networks. Once installed onto a computer, Downloader.Generic_c.AHI retrieves and executes files from a remote server on the compromised machine, which is typically a password-stealing component.

Posted on July 16, 2009 in Trojans

Win32/Virut.NBK

Win32/Virut.NBK is a trojan virus that typically infiltrates a computer by altering file names in the registry and installing numerous malware onto the infected system. Once installed, Win32/Virut.NBK may activate corrupt .exe and .dll files and download additional malware threats onto the computer. Win32/Virut.NBK is usually spread via infected email attachments, pornographic web sites and dubious file-sharing and shareware downloads.

Posted on July 16, 2009 in Trojans

Twitter's Security Woes and Meltdowns

Over the past few months Twitter has faced many security related problems ranging from hackers obtaining the login credentials of Twitter users, to malicious tweets linking users to web sites that spread malware. If the current security issues that plague Twitter are not resolved soon, then it will more than likely come back to haunt this company in the near future and possibly hinder it's growth. How does Twitter reaffirm to its users that they provide a safe service when every other week a famous or well-known person's Twitter account gets hacked or private documents get posted repeatedly? Not only do accounts get hacked, but attackers use Twitter to spread malware infections such as the recent Koobface worm. The use of third party services that attempt to make the Twitter experience better have been used by attackers to gain access...

Posted on July 15, 2009 in Computer Security

W32.SillyFDC.BCE

W32.SillyFDC.BCE is a worm that spreads via removable hard drives from computer to computer, lowering security settings by altering the registry entries related to antivirus programs and firewalls as soon as it is active. W32.SillyFDC.BCE may also create its own entry in order to begin running as soon as Windows starts up. W32.SillyFDC.BCE may also block security-related web sites.

Posted on July 15, 2009 in Worms

Rustock SpamBOT

Rustock SpamBOT is a trojan that causes the IP address of a computer to be included on the IP blacklist provided on specialized internet resources. This may cause the user to be unable to access certain essential computer system functions, as well as limiting the scope of internet services available.

Posted on July 15, 2009 in Trojans