Trojan.BHO.btgg
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Ranking: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
Threat Level: | 90 % (High) |
Infected Computers: | 4 |
First Seen: | January 4, 2012 |
Last Seen: | October 18, 2020 |
OS(es) Affected: | Windows |
Computer users in India have been targeted by an email scam that attempts to take advantage of the recent death of the North Korean dictator Kim Jong II. This email scam is closely linked to the Trojan.BHO.btgg malware and, like a large number of recent email attacks, is programmed to exploit a zero day vulnerability in Acrobat Reader. If an email claiming to have news about Kim Jong II appears in your mail box, ESG security researchers strongly recommend against opening it or downloading any attached files. If the subject of this spam email peaks your curiosity about Kim Jong II, ESG malware researchers recommend getting your information on his death from a trusted news source or from a reliable online encyclopedia instead of from unsolicited email messages. Every time a celebrity or famous political figure dies, criminals take advantage of the event to send out spam email. In 2011 we saw this happen with the deaths of Steve Jobs, Amy Winehouse, and Muammar Gaddafi. If you have fallen victim to the Trojan.BHO.btgg scam, ESG security researchers recommend using an appropriate anti-malware application to annihilate any malware from your computer system.
Trojan.BHO.btgg Is Distributed Through a Corrupt PDF File
The malicious email message linked to Trojan.BHO.btgg contains a file attachment titled 'BriefintroductionofKim-Jong-il.pdf'. While PDF files are typically considered being safe formats to be opened and downloaded, a zero day vulnerability in Adobe Acrobat Reader 9.0 has set off a large number of email attacks with corrupt PDF files. These security vulnerabilities are known as CVE-2010-2883 and CVE-2010-3333 which allow criminals to use these kinds of files to force the infected computer system to connect to a remote server and to execute malicious code. This allows Trojan.BHO.btgg to download and install various dangerous malware infections onto the victim's computer. Because of this, ESG security researchers strongly advise against opening any attached files or clicking on embedded links included in unsolicited email messages. This is regardless of whether the messages appear to come from a reliable or trusted source (since criminals can easily spoof email addresses and their email's design to match various reliable senders) or whether the attached file seems to contain a file type that is not an executable or other kinds of files typically associated with malware. As happened with PDF files, sudden security vulnerabilities in trusted applications or operating systems can quickly be exploited before software manufacturers can patch their applications.
Submit Comment
Please DO NOT use this comment system for support or billing questions. For SpyHunter technical support requests, please contact our technical support team directly by opening a customer support ticket via your SpyHunter. For billing issues, please refer to our "Billing Questions or Problems?" page. For general inquiries (complaints, legal, press, marketing, copyright), visit our "Inquiries and Feedback" page.