Protect your privacy with new targets for April 2010 (0149.0174-0149.0202)

by Albin on April 12th, 2010 in Definition File Updates.

Newly created families for April 2010 (0149.0174-0149.0202)

ADWARE

Adware is a type of advertising display software that delivers advertising content potentially in a manner or context that may be unexpected and unwanted by users. Many adware applications also perform tracking functions, and therefore may also be categorized as tracking technologies. Some consumers may want to remove adware if they object to such tracking, do not wish to see the advertising caused by the program, or are frustrated by its effects on system performance.

Win32.Adware.Accessibility
Win32.Adware.Altnet
Win32.Adware.BarDiscover
Win32.Adware.Harmohol
Win32.Adware.Hyperlinker
Win32.Adware.Mbkwbar
Win32.Adware.Mediaplex
Win32.Adware.Mediapops
Win32.Adware.MetaCafe
Win32.Adware.PerfNav
Win32.Adware.Topicks
Win32.Adware.Winww

BACKDOORS

Backdoors may open up ports on the compromised computer, allowing remote access and control of the victim's machine.

Win32.Backdoor.BackStor
Win32.Backdoor.Clip
Win32.Backdoor.Faybox
Win32.Backdoor.Firsttime
Win32.Backdoor.Foobot
Win32.Backdoor.Jewdo
Win32.Backdoor.Lolbot
Win32.Backdoor.Luja
Win32.Backdoor.Netbfx
Win32.Backdoor.Netuoper
Win32.Backdoor.Procat
Win32.Backdoor.Realgz
Win32.Backdoor.Shilf
Win32.Backdoor.Sykipot
Win32.Backdoor.Talsab
Win32.Backdoor.Tilser
Win32.Backdoor.Unidor
Win32.Backdoor.WoW
Win32.Backdoor.Yungs
Win32.Backdoor.Zhang
Win32.BackdoorIRC.Inter
Win32.BackdoorIRC.K-Ident
Win32.BackdoorIRC.Netz
Win32.BackdoorIRC.Yobot

DIALERS

Any program that utilizes a computer's modem to make calls or access services. Users may want to remove Dialers that dial without the user's active involvement, resulting in unexpected telephone charges and/or cause access to unintended and unwanted content.   

Win32.Dialer.Polyekdo
Win32.Dialer.Ragazze
Win32.Dialer.Sura

DOWNLOADERS

Downloaders are programs designed to retrieve and install additional files. Downloaders can be useful tools for consumers to automate upgrades of essential software such as operating system upgrades, browsers, anti-virus applications, anti-spyware tools, games and other useful applications. Unauthorized downloaders are used by third parties to download potentially unwanted software without user notification or consent.

Win32.TrojanDownloader.Dakedam
Win32.TrojanDownloader.Embratel
Win32.TrojanDownloader.GetFiles
Win32.TrojanDownloader.Hlink
Win32.TrojanDownloader.Holistyc
Win32.TrojanDownloader.Pluxs
Win32.TrojanDownloader.Smatcher
Win32.TrojanDownloader.Tobor
Win32.TrojanDownloader.WMS

FLOODERS

Flooders may provide functionality that makes it possible for an attacker to send massive amount of data to a specific target. The flooding of a target may for an example disturb communication services or make various systems unresponsive. This is similar to a DDoS attack where a massive amounts of calls are launched against a system. A DDos attack may even make large systems unresponsive if the attack is launched from several computer systems that are infected by a DDoS capable Trojan Horse.   

Win32.EmailFlooder.Friendgreetings
Win32.EmailFlooder.Kalsit
Win32.EmailFlooder.Uy
Win32.Flooder.Irckill
Win32.Flooder.PortPro
Win32.Flooder.Skapel
Win32.Flooder.Skype
Win32.Flooder.Sloot
Win32.Flooder.Syn
Win32.IMFlooder.Ciberscraps
Win32.IMFlooder.Yfame

MONITORS

Monitors are surveillance tools that for example monitors users keystrokes and it therefore may compromise user privacy if it is used in a bad manner.

Win32.Monitor.AsanSpy
Win32.Monitor.DaiViet
Win32.Monitor.KeyloggerProgram
Win32.Monitor.LanAgent
Win32.Monitor.NeoSpy
Win32.Monitor.Orvell
Win32.Monitor.SCKeyLog
Win32.Monitor.XTS

PASSWORD STEALERS


Password stealers can steal user passwords on an infected system, compromising system security and user privacy.

Win32.TrojanPWS.Googster
Win32.TrojanPWS.Intetest
Win32.TrojanPWS.Keyman
Win32.TrojanPWS.MSILAgent
Win32.TrojanPWS.Osmer

ROUGE ANTI-SPYWARE APPLICATIONS

Rogue anti-spyware applications may give exaggerated threat reports on the
compromised computer, and then ask the user to purchase a registered version
to remove those reported threats.

Win32.FraudTool.AntiMalwareDoctor
Win32.FraudTool.Antivirus7
Win32.FraudTool.CleanUp
Win32.FraudTool.CleanUpAntivirus
Win32.FraudTool.MaCatte
Win32.FraudTool.SecurityFighter
Win32.FraudTool.SecurityGuard
Win32.FraudTool.YourProtection
Win32.FraudTool.UserAntivirus2010

TROJANS

Trojans (also known as Trojan Horses) are programs that appear to do one thing but actually do another. Trojans may also download additional files to the infected system.

Win32.Trojan.Cleanup
Win32.Trojan.Cursor
Win32.Trojan.Este
Win32.Trojan.Fowin
Win32.Trojan.Galf
Win32.Trojan.Ghodow
Win32.Trojan.Indl
Win32.Trojan.Jkfg
Win32.Trojan.Lunam
Win32.Trojan.Madcode
Win32.Trojan.Multer
Win32.Trojan.NeoKit
Win32.Trojan.Oficla
Win32.Trojan.Phak
Win32.Trojan.Rublik
Win32.Trojan.Sirefef
Win32.Trojan.SpyEye
Win32.Trojan.Tutto

TROJAN.CLICKERS

Trojan.Clicker’s may cause the victims machine to contact a target webpage without the users knowledge or consent to falsify data about the number of times the webpage is visited.

Win32.TrojanClicker.Kiso

TROJANDDOS

TrojanDDoS applicaitons provides functionality that makes it possible for an attacker
to send massive amount of data to a specific target. The flooding of a target may for an example disturb communication services or make various systems unresponsive.

Win32.TrojanDDoS.Blackcat
Win32.TrojanDDoS.Mole
Win32.TrojanDDoS.Udodos

TROJANDROPPERS

Trojan.Droppers will drop additional files on the infected system. These files are often other trojans or downloaders.

Win32.TrojanDropper.CosstaDr
Win32.TrojanDropper.Instroj
Win32.TrojanDropper.Keenval
Win32.TrojanDropper.Koobface
Win32.TrojanDropper.Meci
Win32.TrojanDropper.MSILStubRC
Win32.TrojanDropper.Zaslanetzh   

TROJANSPIES

Trojan.Spy is a type of malicious program that can steal information such as passwords, surfing habits, credit card details and email addresses.

Win32.TrojanSpy.Batist
Win32.TrojanSpy.Gamad
Win32.TrojanSpy.Jban
Win32.TrojanSpy.Krepper
Win32.TrojanSpy.MSILKeyLogger
Win32.TrojanSpy.Nabyoo

WORMS

Worms are network malware, primarily replicating on networks. Usually, a worm will
execute itself automatically on a remote machine without any extra help from a user.
However, there are worms, such as mass-mailer worms, that will not always automatically execute themselves without the help of a user.

Win32.IRCWorm.Housex
Win32.Worm.Bugau
Win32.Worm.Frag
Win32.Worm.Mapia
Win32.Worm.Moldyow
Win32.Worm.Nekav
Win32.Worm.Rundi
Win32.Worm.Seroteb
Win32.Worm.Tilence

MISCELLANEOUS MALWARE

This grouping contains other programs with malicious intentions.

BAT.Trojan.AddUser
BAT.Trojan.Agent
BAT.Trojan.Anitv
BAT.Trojan.DelAll
BAT.Trojan.Delautoexec
BAT.Trojan.DelFiles
BAT.Trojan.DelSys
BAT.Trojan.Deltree
BAT.Trojan.Deltreey
BAT.Trojan.Delwin
BAT.Trojan.Emilia
BAT.Trojan.Exitwindows
BAT.Trojan.Flood
BAT.Trojan.Format
BAT.Trojan.Haltwin
BAT.Trojan.KeyboardDisable
BAT.Trojan.KillAll
BAT.Trojan.KilLAV
BAT.Trojan.KillWin
BAT.Trojan.Looper
BAT.Trojan.Mkdirs
BAT.Trojan.Mousedisable
BAT.Trojan.Munga
BAT.Trojan.NetStop
BAT.Trojan.Nodeldir
BAT.Trojan.Noshare
BAT.Trojan.Passer
BAT.Trojan.Proxy
BAT.Trojan.Reboot
BAT.Trojan.Regger
BAT.Trojan.Runner
BAT.Trojan.Shutdown
BAT.Trojan.Small
BAT.Trojan.Starter
BAT.Trojan.Winkiller
BAT.Trojan.VKHost
BAT.TrojanClicker.Agent
BAT.TrojanClicker.Small
BAT.Trojandownloader.Agent
BAT.TrojanDownloader.Ftp
BAT.Trojandownloader.Small
BAT.TrojanDropper.Agent
BAT.TrojanDropper.Dmenu
Bat.Worm.Agent
Bat.Worm.Qhost
MSIL.Trojan.Agent
MSIL.Trojan.DelFiles
MSIL.TrojanDownloader.Tiny
MSIL.TrojanDropper.Agent
MSIL.TrojanDropper.StubRC
MSIL.TrojanPWS.Dybalom
MSIL.TrojanSpy.KeyLogger
Win32.Hoax.Faketrojan
Win32.Hoax.Winshield
Win32.Rootkit.Koobface
Win32.Rootkit.Xcp
Win32.Toolbar.Fishbar
Win32.TrojanIM.Faker
Win32.TrojanIM.Geef
Win32.TrojanIM.Guide
Win32.TrojanMailfinder.Alexmo
Win32.TrojanMailfinder.Icqreg
Win32.TrojanMailfinder.KingMailer
Win32.TrojanRansom.IMblocker
Win64.Backdoor.Botnet