SONAR.IRCBOT.NG
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Ranking: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
Threat Level: | 90 % (High) |
Infected Computers: | 3 |
First Seen: | June 5, 2012 |
Last Seen: | October 18, 2020 |
OS(es) Affected: | Windows |
Sonar.IRCBOT.Ng is a malicious program and Trojan displaying typical mischief on poorly protected systems running Microsoft Windows and having little or no Internet security. Sonar.IRCBOT.Ng uses common distribution vectors to gain deceptive entry, including masks to present its program as a helpful tool. Often malware is concealed inside the download of shareware or freeware or cloaked behind an infectious link or attachment in spoofed email communication.
Depending on the malware maker will determine the type and amount of threats that will be waged by Sonar.IRCBOT.Ng. At a minimum, data will be stolen out of the browser cache and off the hard drive. A port will be opened to intercept the download of other malicious programs, such as a backdoor to give a hacker remote access that allows him to use the infected system's resources to launch a DNS strike. A keylogger may also be installed to capture keystrokes being entered into web-based forms of a financial nature.
Sonar.IRCBOT.Ng is fortified by a rootkit and will aggressively resist standard removal attempts. For example, administrative controls may fail to work, or the browser may block visits to helpful malware removal sites. Rootkits also help masks and bury infected files so they come into sight the same as legitimate operating system files and components. Removing the wrong files could corrupt your hard drive, which why it is best to use a professional anti-malware solution equipped with an anti-rootkit component.
Submit Comment
Please DO NOT use this comment system for support or billing questions. For SpyHunter technical support requests, please contact our technical support team directly by opening a customer support ticket via your SpyHunter. For billing issues, please refer to our "Billing Questions or Problems?" page. For general inquiries (complaints, legal, press, marketing, copyright), visit our "Inquiries and Feedback" page.