Protect your privacy - new targets for July 2009

by Andy on July 6th, 2009 in Definition File Updates.

Newly created families for July (0148.0050-0148.0065)

ADWARE

Adware is a type of advertising display software that delivers advertising content potentially in a manner or context that may be unexpected and unwanted by users. Many adware applications also perform tracking functions, and therefore may also be categorized as tracking technologies. Some consumers may want to remove adware if they object to such tracking, do not wish to see the advertising caused by the program, or are frustrated by its effects on system performance.

Win32.Adware.Bannermod
Win32.Adware.BrowserVillage
Win32.Adware.Cashmoa
Win32.Adware.Gamevance
Win32.Adware.Give2SMS

BACKDOORS

Backdoors may open up ports on the compromised computer, allowing remote access and control of the victim's machine.

Win32.Backdoor.Bifrost
Win32.Backdoor.Cubot
Win32.Backdoor.Dealfa
Win32.Backdoor.Dgirl
Win32.Backdoor.Gacho
Win32.Backdoor.Netangel
Win32.Backdoor.Peepviewer
Win32.Backdoor.Skimer
Win32.Backdoor.Totalbot
Win32.Backdoor.Vbdoor
Win32.Backdoor.Zzslash

DIALERS

Any program that utilizes a computer's modem to make calls or access services. Users may want to remove Dialers that dial without the user's active involvement, resulting in unexpected telephone charges and/or cause access to unintended and unwanted content.

Win32.Dialer.Archiviosex
Win32.Dialer.Bt
Win32.Dialer.Cutygirls
Win32.Dialer.Onlinedialer
Win32.Dialer.Tibs
Win32.Dialer.X-diver

FLOODERS

Flooders may provide functionality that makes it possible for an attacker to send massive amount of data to a specific target. The flooding of a target may for an example disturb communication services or make various systems unresponsive. This is similar to a DDoS attack where a massive amounts of calls are launched against a system. A DDos attack may even make large systems unresponsive if the attack is launched from several computer systems that are infected by a DDoS capable Trojan Horse

Win32.EmailFlooder.Anonmail
Win32.EmailFlooder.Smtp
Win32.SMSFlooder.MagicShadow

PASSWORD STEALERS

Password stealers can steal user passwords on an infected system, compromising system security and user privacy.

Win32.TrojanPWS.Bjlog
Win32.TrojanPWS.Bjlog
Win32.TrojanPWS.Delta
Win32.TrojanPWS.Fraudload
Win32.TrojanPWS.Moninet
Win32.TrojanPWS.Riodrv
Win32.TrojanPWS.Toksteal
Win32.TrojanPWS.Yahoo

ROGUE ANTI-SPYWARE APPLICATIONS

Rogue anti-spyware applications may give exaggerated threat reports on the
compromised computer, and then ask the user to purchase a registered version
to remove those reported threats.

Win32.FraudTool.AntivirusBEST
Win32.FraudTool.Contraviro
Win32.FraudTool.Crusader
Win32.FraudTool.GeneralAntivirus
Win32.FraudTool.SecretService
Win32.FraudTool.Terminator2009
Win32.FraudTool.VirusRemoverProfessional

TROJANS

Trojans (also known as Trojan Horses) are programs that appear to do one thing but actually do another. Trojans may also download additional files to the infected system.

Win32.Trojan.Cold
Win32.Trojan.Cosne
Win32.Trojan.Gopackages
Win32.Trojan.Hsp
Win32.Trojan.Kidozer
Win32.Trojan.Kilie
Win32.Trojan.Koblu
Win32.Trojan.Mista
Win32.Trojan.Mondere
Win32.Trojan.Ransom
Win32.Trojan.Refroso
Win32.Trojan.Timpin

TROJAN CLICKERS

Trojan Clickers may cause the victims machine to contact a target webpage without the users knowledge or consent to falsify data about the number of times the webpage is visited.

Win32.TrojanClicker.Pesibawt

TROJAN DOWNLOADERS

Downloaders are programs designed to retrieve and install additional files. Downloaders can be useful tools for consumers to automate upgrades of essential software such as operating system upgrades, browsers, anti-virus applications, anti-spyware tools, games and other useful applications. Unauthorized downloaders are used by third parties to download potentially unwanted software without user notification or consent.

Win32.TrojanDownloader.Bro
Win32.TrojanDownloader.Cekar
Win32.TrojanDownloader.Clicker
Win32.TrojanDownloader.Climor
Win32.TrojanDownloader.Dlfbfkg
Win32.TrojanDownloader.FakeVimes
Win32.TrojanDownloader.Gogogovb
Win32.TrojanDownloader.Home
Win32.TrojanDownloader.Ilovelanch
Win32.TrojanDownloader.Tracur
Win32.TrojanDownloader.Virtumonde
Win32.TrojanDownloader.Wigon

TROJAN DROPPERS

Trojan.Droppers will drop additional files on the infected system. These files are often other trojans or downloaders.

Win32.TrojanDropper.Coproc
Win32.TrojanDropper.Droco
Win32.TrojanDropper.Drostuh
Win32.TrojanDropper.Drovedro
Win32.TrojanDropper.Exebind
Win32.TrojanDropper.Foreah
Win32.TrojanDropper.Ljoiner
Win32.TrojanDropper.Nail
Win32.TrojanDropper.Stabs
Win32.TrojanDropper.Stabs
Win32.TrojanDropper.Svb

TROJAN SPIES

Trojan Spy is a type of malicious program that can steal information such as passwords, surfing habits, credit card details and email addresses.

Win32.TrojanSpy.Bjcg
Win32.TrojanSpy.Cpatcha
Win32.TrojanSpy.Fgspy
Win32.TrojanSpy.Isapass
Win32.TrojanSpy.Jiospy
Win32.TrojanSpy.Known
Win32.TrojanSpy.Konghoo
Win32.TrojanSpy.Perfkey
Win32.TrojanSpy.Qhost
Win32.TrojanSpy.Rion
Win32.TrojanSpy.Socks
Win32.TrojanSpy.Zagaban
Win32.TrojanSpy.Zapchast

WORMS

Worms are network malware, primarily replicating on networks. Usually, a worm will
execute itself automatically on a remote machine without any extra help from a user.
However, there are worms, such as mass-mailer worms, that will not always automatically execute themselves without the help of a user.

Win32.Worm.Duella
Win32.Worm.Emold
Win32.Worm.Mispace
Win32.Worm.Radminer
Win32.Worm.Tisandr
Win32.Worm.Trojandownloader
Win32.P2PWorm.IRC
Win32.P2PWorm.MSIL

MISCELLANEOUS MALWARE

This grouping contains other programs with malicious intentions.

Win32.Hoax.Autohotkey
Win32.Hoax.Delf
Win32.Hoax.Kyivstar
Win32.Hoax.SpyCar
Win32.Hoax.Spywareguard2008
Win32.Exploit.IMG-WMF
Win32.TrojanMailfinder.Gadina