Threat Database Rootkits

By GoldSparrow in Rootkits

If your PC gets infected with, you may be in big trouble. This Trojan belongs to the rootkit category of cyber threats, which are exceptionally stubborn. This threat compromises the PC on a very deep level, spreading its threatening files across the whole system. may interact with other applications and essential processes of the Operating System (OS). It tries to evade detection, so may block the performance of some conventional security programs. The worst trait of this threat is that may create backdoors that may, in turn, provide the hackers behind the attack remote control of your system. This connection would enable them to undertake various harmful operations: they may collect valuable data from your disk or obtain your online credentials. If they manage to collect passwords for your payment and banking accounts, the results may be severe financial losses.

The cyber crooks also may use to load additional threats for more specific tasks. Once it settles in, this Trojan will become active each time you start your PC. To accomplish it, modifies the Windows Registries. It creates a few subkeys of its own, and at the same time changes the values of registry entries of other applications. It is better to block the access of before it infects your PC rather than having to clean the machine afterwards, so you need to know how it travels across the cyberspace. relies primarily on drive-by downloads. It may sneak in automatically if you visit corrupted pages, or you may install it together with other software that seems safe. may come together with a rogue security program called Rogue:Win32/Winwebsec. If you have any reason to assume this threat may be working on your system, you should perform a scan with advanced security software immediately.


Most Viewed