Protect your privacy with new targets for April 2009 (0147.0000-0148.0009)

by Albin on April 16th, 2009 in Definition File Updates.

Protect your privacy with new targets for April 2009 (0147.0000-0148.0009)

Newly created families for April (0147.0000-0148.0009)

 

BACKDOORS

Backdoors may open up ports on the compromised computer, allowing remote access and control of the victim's machine.

Win32.Backdoor.Biffy
Win32.Backdoor.Bizzy
Win32.Backdoor.Buzus
Win32.Backdoor.Messatr
Win32.Backdoor.Oqx
Win32.Backdoor.Pangus
Win32.BackdoorIRC.Epoch


DIALERS

Any program that utilizes a computer's modem to make calls or access services. Users may want to remove Dialers that dial without the user's active involvement, resulting in unexpected telephone charges and/or cause access to unintended and unwanted content.

Win32.Dialer.CFDial
Win32.Dialer.Plsex

 

DOWNLOADERS

Downloaders are programs designed to retrieve and install additional files. Downloaders can be useful tools for consumers to automate upgrades of essential software such as operating system upgrades, browsers, anti-virus applications, anti-spyware tools, games and other useful applications. Unauthorized downloaders are used by third parties to download potentially unwanted software without user notification or consent.

Win32.TrojanDownloader.Cafys
Win32.TrojanDownloader.Deepgal
Win32.TrojanDownloader.Elly
Win32.TrojanDownloader.Kido
Win32.TrojanDownloader.Pangu
Win32.TrojanDownloader.Renos
Win32.TrojanDownloader.Sconerat
Win32.TrojanDownloader.Taviv
Win32.TrojanDownloader.Tiltee

FLOODERS

Flooders may provide functionality that makes it possible for an attacker to send massive amount of data to a specific target. The flooding of a target may for an example disturb communication services or make various systems unresponsive. This is similar to a DDoS attack where a massive amounts of calls are launched against a system. A DDos attack may even make large systems unresponsive if the attack is launched from several computer systems that are infected by a DDoS capable Trojan Horse.

Win32.Flooder.AngryPing

PASSWORD STEALERS

Password stealers can steal user passwords on an infected system, compromising system security and user privacy.

Win32.TrojanPWS.Netpass
Win32.TrojanPWS.Skyper
Win32.TrojanPWS.YahooVB
Win32.TrojanPWS.YCW

ROUGE ANTI-SPYWARE APPLICATIONS

Rogue anti-spyware applications may give exaggerated threat reports on the compromised computer, and then ask the user to purchase a registered version to remove those reported threats.

Win32.FraudTool.Antivirus09
Win32.FraudTool.AntiVirus360Remover
Win32.FraudTool.AV360RemovalTool
Win32.FraudTool.ErrorNuker
Win32.FraudTool.PrivacyCenter
Win32.FraudTool.Renus2008
Win32.FraudTool.SmitfraudFixTool
Win32.FraudTool.SystemProtector
Win32.FraudTool.ThreatNuker
Win32.FraudTool.WinPCAntivirus
Win32.FraudTool.WinPCDefender
Win32.FraudTool.VundoFixTool

TROJANS

Trojans (also known as Trojan Horses) are programs that appear to do one thing but actually do another. Trojans may also download additional files to the infected system.

Win32.Trojan.AntiAV
Win32.Trojan.Behadau
Win32.Trojan.CeeInject
Win32.Trojan.Clisora
Win32.Trojan.Comeli
Win32.Trojan.Kilkav
Win32.Trojan.Killmbr
Win32.Trojan.Krament
Win32.Trojan.Nomen
Win32.Trojan.PWS
Win32.Trojan.Ruvs
Win32.Trojan.Spbot
Win32.Trojan.Stuh
Win32.Trojan.Winkush

TROJAN.CLICKERS

Trojan.Clicker’s may cause the victims machine to contact a target webpage without the users knowledge or consent to falsify data about the number of times the webpage is visited.

Win32.TrojanClicker.Foxwar
Win32.TrojanClicker.Vesloruki
Win32.TrojanClickerMsil.Xone

TROJANDROPPERS

Trojan.Droppers will drop additional files on the infected system. These files are often other trojans or downloaders.    

Win32.TrojanDropper.Alfa
Win32.TrojanDropper.Apexlace
Win32.TrojanDropper.Cingo
Win32.TrojanDropper.Comsa
Win32.TrojanDropper.Fakealert
Win32.TrojanDropper.FraudDrop
Win32.TrojanDropper.Hexzone
Win32.TrojanDropper.Kido
Win32.TrojanDropper.MSIL
Win32.TrojanDropper.Oloko
Win32.TrojanDropper.Renos

TROJANSPIES

Trojan.Spy is a type of malicious program that can steal information such as passwords, surfing habits, credit card details and email addresses.

Win32.TrojanSpy.Blackeyes
Win32.TrojanSpy.Darto
Win32.TrojanSpy.Gumai
Win32.TrojanSpy.Nano
Win32.TrojanSpyMsil.Agent

WORMS

Worms are network malware, primarily replicating on networks. Usually, a worm will execute itself automatically on a remote machine without any extra help from a user.
However, there are worms, such as mass-mailer worms, that will not always automatically execute themselves without the help of a user.

Win32.Worm.Buzus
Win32.Worm.Posbot
Win32.Worm.WOW

MISCELLANEOUS MALWARE

This grouping contains other programs with malicious intentions.

Win32.Rootkit.Sinowal
Win32.TrojanNotifier.Zlob
Win32.TrojanPWSmsil.Staem
Win32.TrojanRansom.Agent
Win32.TrojanRansom.Fixer
Win32.TrojanRansom.SMSer