Troj/Dloadr-DPB
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Ranking: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
Threat Level: | 90 % (High) |
Infected Computers: | 13,390 |
First Seen: | July 2, 2012 |
Last Seen: | September 8, 2022 |
OS(es) Affected: | Windows |
Troj/Dloadr-DPB is a Trojan infection is distributed via a spam email message claiming to have been sent by ADP (a legitimate provider of payroll-related services). This malicious email message contains an HTML link that leads to a JavaScript redirect detected as Troj/JSRedir-H which in turn leads to a website containing the BlackHole Exploit Kit in order to install Troj/Dloadr-DPB. Troj/Dloadr-DPB has been associated with various JavaScript redirects, often sent out in spam email messages. To prevent a Troj/Dloadr-DPB infection, ESG security researchers strongly advise taking appropriate safety precautions when opening email messages and ensuring that you use reliable security software that is fully up to date.
Like most Trojans, Troj/Dloadr-DPB is not capable of spreading on its own from one computer to another. Troj/Dloadr-DPB relies on other Trojans, such as the JavaScript redirect mentioned above, and on social engineering techniques in order to infect computer systems. A Troj/Dloadr-DPB infection will usually not cause any explicit symptoms and, usually the computer user will not detect a problem until Troj/Dloadr-DPB has downloaded other, more visible malware onto the infected computer system. Although disabling JavaScript can stop the JavaScript redirects associated with Troj/Dloadr-DPB, it is often more convenient to use a reliable anti-malware program and common sense in order to prevent an infection.
What You Can Do to Prevent a Troj/Dloadr-DPB Infection
Like with most malware infections, prevention is the key in avoiding larger problems such as loss of sensitive data and irreparable damage to your operating system. ESG security analysts recommend taking the following measures in order to prevent a Troj/Dloadr-DPB infection:
- Ensure that you have a reliable and fully updated spam filter installed at all times, and that its security settings are adjusted at their maximum level. The best way to prevent a Troj/Dloadr-DPB attack is to ensure that its malicious email message never lands in your inbox in the first place.
- Never, under any circumstances, open file attachments or embedded links contained in unsolicited email messages, even if they appear to come from well-known companies or other supposedly reliable sources.
- Use a reliable anti-malware scanner and a firewall. Both should be running at all times and maintained up to date with the latest virus definitions.
Submit Comment
Please DO NOT use this comment system for support or billing questions. For SpyHunter technical support requests, please contact our technical support team directly by opening a customer support ticket via your SpyHunter. For billing issues, please refer to our "Billing Questions or Problems?" page. For general inquiries (complaints, legal, press, marketing, copyright), visit our "Inquiries and Feedback" page.