Threat Database Trojans Trojan.Win32.Agent.bcn

Trojan.Win32.Agent.bcn

Trojan.Win32.Agent.bcn Facts and General Information

- The name Trojan.Win32.Agent.bcn is used commonly to refer to a group of backdoor Trojans based on Bifrose, a specific kind of spyware program.

- All of the different variants of the Trojan.Win32.Agent.bcn Trojan are very dangerous to your system. Any possible infection with this Trojan should be considered a very serious security problem.

- The Trojan.Win32.Agent.bcn Trojan can steal your personal information, attack your computer at the highest level, and give control of your computer to a third party.

- Since the Trojan.Win32.Agent.bcn Trojan is extremely good at hiding itself, the key factor in avoiding this infection is prevention.

- If you have any reasons to think that your computer is under attack by the Trojan.Win32.Agent.bcn Trojan, you should take immediate steps to protect any sensitive information on your computer and remove the Trojan.Win32.Agent.bcn Trojan at once.

- The Trojan.Win32.Agent.bcn Trojan can appear with different names. This depends both on the version of Trojan.Win32.Agent.bcn attacking your computer and the security application detecting Trojan.Win32.Agent.bcn. This Trojan has been known to appear with these named: BackDoor-CEP.svr, Backdoor:Win32/Bifrose.ACI, Virus.Win32.Bifrose, and Win-Trojan/Bifrose.29053
 

Where Does the Trojan.Win32.Agent.bcn Trojan Come from and When Did It Start Appearing?

Almost all of the reported infections of the Trojan.Win32.Agent.bcn Trojan have been reported in Sweden and its neighboring countries. Because of this, you should take extra precautions when interacting with websites or files from this region. The bulk of attacks of the Trojan.Win32.Agent.bcn Trojan have been reported in the spring of 2011. Because of this, it is important to have your security tools and Internet browsers updated up to this point, at the very least. Keeping your security programs constantly updated is very important to avoid infection with any malicious software. There is a constant arms race between the criminal creating these security threats and computer security experts around the world. To stay one step ahead of the game, make sure that you download your updates regularly directly from the manufacturer.
 

Possible Effects of the Trojan.Win32.Agent.bcn Trojan on Your Computer

The effects of the Trojan.Win32.Agent.bcn Trojan differ greatly from case to case. One of the most notorious of these is the way the Trojan.Win32.Agent.bcn Trojan has been used to steal personal information. It can attach itself to Internet Explorer and have keystroke logging capabilities. Some versions of the Trojan.Win32.Agent.bcn Trojan have also been known to have screen capturing. These two features make the Trojan.Win32.Agent.bcn Trojan a notorious data thief. Criminals can use the Trojan.Win32.Agent.bcn keylogger and screen captures to steal sensitive personal information like passwords, important personal information, and bank account and credit card number. The Trojan.Win32.Agent.bcn Trojan can also make your computer more vulnerable to further attacks from other sources. To protect itself, Trojan.Win32.Agent.bcn can alter your firewall settings and send and receive information from malicious websites and third parties.
 

The Trojan.Win32.Agent.bcn Trojan Can Turn Your Computer into a Zombie

One of the most harmful effects of the Trojan.Win32.Agent.bcn Trojan is that Trojan.Win32.Agent.bcn can hand over complete control of your computer to a hacker. It makes dangerous alterations to your system that allows a hacker to control your computer remotely, giving him the liberty to do anything he/her wants with it. Even worse, the Trojan.Win32.Agent.bcn Trojan can connect your computer to a remote IRC channel to receive orders from a particular server. This means that your computer can become a way of further spreading Trojans like Trojan.Win32.Agent.bcn, or it may be used to send spam emails and participate in coordinated DDOS attacks along with millions of infected computers.

File System Details

Trojan.Win32.Agent.bcn may create the following file(s):
# File Name Detections
1. %ProgramFiles%\jgk\server.exe
2. %Temp%\IXP000.TMP\PROCDUMP.EXE
3. %Temp%\ixp000.tmp\hassan~1.exe
4. %ProgramFiles%\jgk\klog.dat
5. %AppData%\addon.dat

Registry Details

Trojan.Win32.Agent.bcn may create the following registry entry or registry entries:
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\S1TRACE\Security]
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\S1TRACE\Security]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce]
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\MediaResources\msvideo
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\S1TRACE]
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\S1TRACE]
[HKEY_LOCAL_MACHINE\SOFTWARE\Bifrost]
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\MediaResources\msvideo
[HKEY_CURRENT_USER\Software\Bifrost]
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\S1TRACE\Enum]
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\S1TRACE\Enum]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9B71D88C-C598-4935-C5D1-43AA4DB90836}]

Trending

Most Viewed

Loading...