Database Updates Worm.NetSky.Q, Email-Worm.Bugbear.b,...

Worm.NetSky.Q, Email-Worm.Bugbear.b, Email-Worm.Tanatos.a, more - SpyHunter Update v.7.28

By GoldSparrow in Database Updates

SpyHunter Spyware Definitions Update: v.7.28 (11/30/2007) SpyHunter Latest Program Update: v.3.2.0

Keep Your SpyHunter Up to Date

New spyware appear almost every day. Updating your SpyHunter regularly can protect you against newly released spyware, adware, worms, trojans and other malicious threats.

To use SpyHunter's Instant Definition Update, which provides the latest spyware definition updates and other program updates, go to SpyHunter > Update > Definitions Update.

Our Advice: If you currently do not have SpyHunter, it is highly recommended you try SpyHunter's Spyware Scanner.

Newly Added Threat List

The following new parasites have been added to SpyHunter:

Worm.NetSky.Q

Worm.NetSky.Q is a dangerous mass mailing worm that spreads via the Internet as an infected email attachment. Once executed, Worm.NetSky.Q will install itself into your Windows registry so that it can automatically start on each Startup. Then Worm.NetSky.Q will try to spread itself to all addresses found on your PC. Worm.NetSky.Q also drops a... more

Email-Worm.Bugbear.b

Email-Worm.Bugbear.b is a malicious mass-mailing worm that is designed to spread as an email attachment. Once it is installed, Email-Worm.Bugbear.b will set in Windows Registry to be able to launch every time you load your computer. Email-Worm.Bugbear.b will search and send its copies to all addresses found onto your computer. Moreover,... more

Email-Worm.Tanatos.a

Email-Worm.Tanatos.a is a mass-mailing worm designed to install itself onto your machine without your knowledge and permission, either bundled with other malware, as an illicit email attachment, or via security exploits. Once it is installed, Email-Worm.Tanatos.a will spread its copies to several locations, including peer to peer file sharing... more

Worm.Mytob-F

Worm.Mytob-F is a mass-mailing worm that spreads in the Internet by email and in local networks by exploiting computers running the Windows operating system with known vulnerabilities. Worm.Mytob-F scans local drives for text and spreadsheet documents, as well as web pages and various programming files. Then Worm.Mytob-F sends e-mail messages to... more

ICQMonitor

ICQMonitor is a monitoring tool created to secretly monitor and record all your ICQ conversations. ICQMonitor uses packet sniffing methods to log all your ICQ chats. The logged conversations then maybe placed into a separate file and delivered to the creator of ICQMonitor. ICQMonitor seriously affects your security and privacy and is recommended... more

IMDetect

IMDetect is a network monitoring program designed to log AIM (AOL Instant Messenger) communication packets. IMDetect seizes both server based and peer-to-peer chat sessions, and can incorporate its chat log into an HTML file for later use. IMDetect places high risk to your personal information and network's security. more

IMMonitor

IMMonitor is a network surveillance program designed to stealthily steal Yahoo Messenger's communication packets. IMMonitor can either block or record all conversations on a local network. In addition, IMMonitor may save the logged data as an HTML file. IMMonitor is a serious threat to the network on which it is installed. more

Spyware.MSNTrackMon

Spyware.MSNTrackMon is a spyware program, created to stealthily log all Windows instant messaging conversations. Spyware.MSNTrackMon may be installed to your system without your knowledge or consent in order to violate your privacy. Spyware.MSNTrackMon is a serious attempt to interfere with your security and privacy and is recommended to be... more

Trojan.Agent.xtn

Trojan.Agent.xtn is a nasty backdoor Trojan program. Once executed on your machine, Trojan.Agent.xtn provides a remote violator full access to your PC and any information stored on it. Your computer will become a proxy server and will be employed by a remote attacker who may use it for malicious purposes, including remote attacks.... more

Adware.CPush

Adware.CPush is an unwanted and excessive adware program that installs on your machine as a BHO (Browser Helper Object). Adware.Cpush is designed to bombard your screen with large numbers of popup advertisements. This may disturb your Internet browsing experience and may result your system to perform more sluggish. Adware.CPush is a potentially... more

Packer.Malware.NSAnti.J

Packer.Malware.NSAnti.J is a malicious program that employs NSAnti packing method, which is designed to masquerade the true nature of any software packed with it. Malware creators often use this tactic in order to distribute their malicious programs. Packer.Malware.NSAnti.J is not a legitimate or useful program and should be removed immediately. more

Adware.Baidu

Adware.Baidu is an adware application created to deliver popup advertisements. Adware.Baidu is reported to be installed via Trojan downloaders and through Javascript drive-by downloads. Baidu is related to a search engine of Chinese origin. Adware.Baidu is also capable to collect and send information on your browsing patterns. more

Adware.Cinmus

Adware.Cinmus is an adware application designed to distribute popup adverts. In addition, Adware.Cinmus will also collect and transmit information on your Internet browsing patterns. It embeds into your browser as a Browser Helper Object (BHO) and can be difficult to manually remove. more

Trojan.Banker-CIY

Trojan.Banker-CIY is a malicious Trojan that belongs to the Banker Trojan family. Trojan.Banker-CIY may be secretly installed onto your system through browser security holes or via other nefarious mechanisms. Once executed, Trojan.Banker-CIY will monitor your searched keywords and will steal passwords to several major banking websites when you enter them in. Trojan.Banker-CIY will also provide the attacker with the details about your computer's hardware. Trojan.Banker-CIY opens up a huge... more

Worm.Zhelatin.ml

Worm.Zhelatin.ml is an email worm that is designed to deliver itself as a spam email attachment. Once executed on your machine, the worm will use rootkit methods in order to avoid detection. Such methods are very tricky and may corrupt the legitimate control of an operating system and may hide running processes, system data or files from the... more

Porn-Dialer.GBDialer

Porn-Dialer.GBDialer is a nasty pornographic dialer. Once installed on your system, Porn-Dialer.GBDialer will disconnect you from your dial-up ISP and reconnect you via an extremely expensive telephone number. As a result you'll receive a huge phone bill. Porn-Dialer.GBDialer is reported to intentionally lead you to pornographic websites. more

SpamTool.Agent.bt

SpamTool.Agent.bt is a malicious program that infects victim's computer through spam email attachments. SpamTool.Agent.bt may be also installed through ActiveX security holes and other illegal mechanisms. Once installed, SpamTool.Agent.bt will stealthily send spam emails to any email addresses that it can locate on your PC. more

Worm.StormWorm

Worm.StormWorm is an extremely dangerous and rather intelligent worm. Worm.StormWorm can be very difficult to manually remove from your machine once you have caught it. Worm.StormWorm is designed to distribute itself via e-mail message that contains misleading content and a link to an electronic greeting card, postcard, news video, or similar... more

Trojan.Zbot

Trojan.Zbot is a fairly generic backdoor Trojan infection that is closely linked to Mal/VB-AER and the Zeus Trojan, one of the most infamous malware infections. Since 2007, Trojan.Zbot has made headlines when Trojan.Zbot was used to infiltrate and steal information from the Transportation Department of the United States. Since March of 2009,... more

Trojan.Peed.INS

Trojan.Peed.INS is created to infect your machine and open a conduit by which large amounts of adware and spyware can be secretly imported to your PC. Trojan.Peed.INS will also open up a large security hole on your system and will cause a serious threat to the security of your personal and financial information. more

Trojan.Agent.cej

Trojan.Agent.cej is a backdoor Trojan application that creeps into the system with the help of other Trojans, through browser security exploits, or under other dubious circumstances. Once executed, Trojan.Agent.cej will copy itself to the Windows root directory so it could be launched every time the user turns his computer on. Trojan.Agent.cej will open up numerous backdoor security holes, allowing the remote attackers to control your computer, execute programs, download additional malware,... more

Backdoor.Padodor

Backdoor.Padodor a is a backdoor Trojan that is designed to obtain unauthorized access to user's machine. Usually, Backdoor.Padodor gets into your system through browser security exploits or other illicit and unethical mechanisms. Once executed, Backdoor.Padodor will hide itself deeply in the system and work in the background. Backdoor.Padodor... more

Crypt.Morphine

Crypt.Morphine is a Trojan program that installs itself on your machine through web browser exploits or bundled with other parasites. Once installed on your machine, Crypt.Morphine will scan and record all your passwords and banking information, including your credit card numbers. Crypt.Morphine poses a serious security risk to your financial... more

Adware.AntiSpamBoy

Adware.AntiSpamBoy is an adware application, which is designed to bombard users with irritating popup advertisements. Usually, Adware.AntiSpamBoy secretly installs itself through browser security exploits or via other unethical mechanisms. Once executed, Adware.AntiSpamBoy will generate hundreds of annoying popup adverts based on your browsing... more

Updated Threat List

The following parasite threats were updated:

Zlob.Trojan VirusProtect Worm.Mydoom Trojan.Surila Worm.Doombot MySpyProtector PWSteal.Lineage Trojan.Bancos Worm.Warezov Trojan-Downloader.Agent-BFJ Vixup.Trojan Trojan.Xorpix Trojan.Spy.BZub TrojanDownloader.Busky TrojanDownloader.ConHook.l Trojan.Vundo Trojan.Dropper-Delf Trojan.Adload Trojan.FakeAlert Adware.SideBar Trojan-Spy.Broker.r MalwareAlarm

Updated Cookie Threats

The following cookie threats were updated:

killerPornStars

Loading...