TSPY_ONLINEG.OMU
TSPY_ONLINEG.OMU is a dangerous spyware infection designed to steal private data from online gamers. TSPY_ONLINEG.OMU installs a malicious backdoor Trojan on the victim's computer system, allowing criminals to gain unauthorized access to the infected computer system. One of the most dangerous aspects of the TSPY_ONLINEG.OMU Trojan is the fact that TSPY_ONLINEG.OMU works together with a malicious backdoor Trojan to make its attack more effective. By combining data theft with the backdoor infection, TSPY_ONLINEG.OMU makes the victim's computer system more vulnerable to future attacks and to other known types of online scams.
Table of Contents
South Korean PC Users are the Target of TSPY_ONLINEG.OMU
Most TSPY_ONLINEG.OMU infections target South Korean computer systems. TSPY_ONLINEG.OMU infections have been detected on compromised South Korean Web pages which host TSPY_ONLINEG.OMU's malicious executable file. TSPY_ONLINEG.OMU is an update of a previous spy Trojan attack known as TSPY_ONLINEG.ASQ that first appeared in 2012. TSPY_ONLINEG.OMU shares numerous characteristics with this previous spy Trojan but has the added backdoor Trojan component that makes its attack considerably more dangerous. TSPY_ONLINEG.OMU is designed to steal account names and passwords for popular online games. Apart from this, a dangerous keylogger and backdoor Trojan is installed if the computer attempts to visit administrator consoles for important websites in various key industries, in an attempt to turn a TSPY_ONLINEG.OMU attack into a more dangerous type of intrusion. These types of attacks are targeting several key industries in South Korea, including companies involved in TV, news, shopping, finance, advertising and gaming.
TSPY_ONLINEG.OMU Targets South Korean Computer Users
One of the main reasons TSPY_ONLINEG.OMU targets computer users in South Korea is the fact that online gaming is very popular in this country. However, the TSPY_ONLINEG.OMU attack may actually be used to hide a more dangerous intent of this attack. Since most malware in TSPY_ONLINEG.OMU's family is known to steal login data for online gaming, computer security researchers may believe that TSPY_ONLINEG.OMU is solely designed to steal gaming credentials. This means that many computer users or PC security analysts may overlook the second stage of the TSPY_ONLINEG.OMU attack which installs dangerous backdoor Trojans on computer systems related to the industries listed above. This sophisticated technique makes PC security analysts suspect that the TSPY_ONLINEG.OMU Trojan may actually be part of a dangerous industrial espionage campaign.
File System Details
# | File Name |
Detections
Detections: The number of confirmed and suspected cases of a particular threat detected on
infected computers as reported by SpyHunter.
|
---|---|---|
1. | %User Temp%\del[RANDOM CHARACTERS].bat | |
2. | %Windows%\version.dat | |
3. | d3d8d[NUMBER].ini | |
4. | %Windows%\wintmp.dat | |
5. | %Windows%\winurl.dat | |
6. | %Windows%\setupball.bmp |
Submit Comment
Please DO NOT use this comment system for support or billing questions. For SpyHunter technical support requests, please contact our technical support team directly by opening a customer support ticket via your SpyHunter. For billing issues, please refer to our "Billing Questions or Problems?" page. For general inquiries (complaints, legal, press, marketing, copyright), visit our "Inquiries and Feedback" page.