TROJ_FAKEAV.CLS
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Ranking: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
Ranking: | 10,197 |
Threat Level: | 20 % (Normal) |
Infected Computers: | 20,309 |
First Seen: | February 24, 2012 |
Last Seen: | September 19, 2023 |
OS(es) Affected: | Windows |
The TROJ_FAKEAV.CLS Trojan is a malware infection designed to infect a computer system with a fake security program from the FakeAV family of rogue anti-malware applications. Some examples of rogue anti-malware programs linked to TROJ_FAKEAV.CLS include Windows Smart Protection, Windows Functionality Checker and Windows Shield Tool. While these kinds of fake security programs can come from several different sources and found to be associated with multiple Trojans dropper and downloaders, TROJ_FAKEAV.CLS in particular is linked to a series of spam email scams and to a campaign of malicious links on online social networks like Facebook. If you suspect that your computer system has become exposed to TROJ_FAKEAV.CLS, ESG security researchers strongly recommend using a reliable anti-malware program from a reputable source to scan your computer system and remove TROJ_FAKEAV.CLS and any malware linked to this Trojan infection. TROJ_FAKEAV.CLS is usually not difficult to recognize, since TROJ_FAKEAV.CLS will usually involve the sudden appearance of an intrusive, bogus anti-malware application on your computer without your authorization.
TROJ_FAKEAV.CLS and Whitney Houston's Death
One would be hard-pressed to find a connection between TROJ_FAKEAV.CLS and recently-deceased international pop superstar Whitney Houston. However, PC security analysts have found that celebrity deaths that receive a lot of publicity tend to lead to waves of malware attacks. In fact, the death of Amy Winehouse in 2011 also was associated with a wave of TROJ_FAKEAV.CLS Trojan infections. This is because criminals will take advantage of these kinds of celebrity deaths to send out spam email or to spam Facebook walls with links claiming to contain news on that particular celebrity's death. Inexperienced computer users will often fall for these scams, clicking on the embedded link in the spam email message or on their Facebook friends' links thinking that it will take them to a legitimate news story. While these kinds of messages will often take the victim to a fake news story, in the background they will take advantage of vulnerabilities in the victim's web browser, operating system or applications in order to deliver malware like TROJ_FAKEAV.CLS into their victim's computer system. Because of this ESG security researchers strongly recommend getting your news from reputed websites rather than from unsolicited email messages or from random links that you may stumble upon on a social network.
URLs
TROJ_FAKEAV.CLS may call the following URLs:
1firstofall1.com |
Submit Comment
Please DO NOT use this comment system for support or billing questions. For SpyHunter technical support requests, please contact our technical support team directly by opening a customer support ticket via your SpyHunter. For billing issues, please refer to our "Billing Questions or Problems?" page. For general inquiries (complaints, legal, press, marketing, copyright), visit our "Inquiries and Feedback" page.