Protect your privacy with new targets for April 2011

by Andy on April 19th, 2011 in Definition File Updates.

ADWARE
Adware is a type of advertising display software that delivers advertising content potentially in a manner or context that may be unexpected and unwanted by users. Many adware applications also perform tracking functions, and therefore may also be categorized as tracking technologies. Some consumers may want to remove adware if they object to such tracking, do not wish to see the advertising caused by the program, or are frustrated by its effects on system performance.
Win32.Adware.IPlus
Win32.Adware.OfferBox

BACKDOORS
Backdoors may open up ports on the compromised computer, allowing remote access and control of the victim's machine.
Win32.Backdoor.Af
Win32.Backdoor.Gnutler
Win32.Backdoor.Hadache
Win32.Backdoor.Mailer
Win32.Backdoor.Netspider
Win32.Backdoor.Officer
Win32.Backdoor.Ruskill
Win32.Backdoor.Xtoober

DIALERS
Any program that utilizes a computer's modem to make calls or access services. Users may want to remove Dialers that dial without the user's active involvement, resulting in unexpected telephone charges and/or cause access to unintended and unwanted content.    
Win32.Dialer.Tuta

FLOODERS
Flooders may provide functionality that makes it possible for an attacker to send massive amount of data to a specific target. The flooding of a target may for an example disturb communication services or make various systems unresponsive. This is similar to a DDoS attack where a massive amounts of calls are launched against a system. A DDos attack may even make large systems unresponsive if the attack is launched from several computer systems that are infected by a DDoS capable Trojan Horse.    
Win32.Flooder.Napsterokoz
Win32.Flooder.Spambot

ROGUE ANTI-SPYWARE APPLICATIONS
Rogue anti-spyware applications may give exaggerated threat reports on the compromised computer, and then ask the user to purchase a registered version to remove those reported threats.
Win32.FraudTool.Ansim2
Win32.FraudTool.AntivirusAntispyware2011
Win32.FraudTool.AntivirusClean2011
Win32.FraudTool.AntivirusMonitor
Win32.FraudTool.BoomCommunication
Win32.FraudTool.BrodinAM
Win32.FraudTool.CleanThis
Win32.FraudTool.CreFree
Win32.FraudTool.DrInfo
Win32.FraudTool.EzPrivacy
Win32.FraudTool.FakeEset
Win32.FraudTool.GoodPrivacy
Win32.FraudTool.GreatEastEntertainment
Win32.FraudTool.hkcommuni
Win32.FraudTool.IDCatch
Win32.FraudTool.IEShowSoft
Win32.FraudTool.IMNetworks
Win32.FraudTool.InfoCare
Win32.FraudTool.InfoGuard
Win32.FraudTool.InfoKeeper
Win32.FraudTool.InfoSave
Win32.FraudTool.InfoZero
Win32.FraudTool.InternetDefender
Win32.FraudTool.ISMedia
Win32.FraudTool.ITglobal
Win32.FraudTool.JECommunication
Win32.FraudTool.MediaClick
Win32.FraudTool.MediaSave
Win32.FraudTool.MedicCop
Win32.FraudTool.MSRemovalTool
Win32.FraudTool.MultiSpy
Win32.FraudTool.MyCheck
Win32.FraudTool.MyCing
Win32.FraudTool.MyInfoGuard
Win32.FraudTool.MySiren
Win32.FraudTool.NemoStory
Win32.FraudTool.NeoProtect
Win32.FraudTool.NetBoan
Win32.FraudTool.PcDrPlus
Win32.FraudTool.PcGkimi
Win32.FraudTool.PCTool
Win32.FraudTool.PosbanKorea
Win32.FraudTool.PrivacyBoan
Win32.FraudTool.PrivacyCare
Win32.FraudTool.PrivacyDel
Win32.FraudTool.PrivacyDonkey
Win32.FraudTool.PrivacyKeeper
Win32.FraudTool.PrivacyKorea
Win32.FraudTool.Qonenetwork
Win32.FraudTool.Rprotector
Win32.FraudTool.ScanZero
Win32.FraudTool.SenaraInternet
Win32.FraudTool.SJDream
Win32.FraudTool.SmileWorknet
Win32.FraudTool.SpyFree
Win32.FraudTool.TerraSolution
Win32.FraudTool.TGSM
Win32.FraudTool.UserChecker
Win32.FraudTool.VaccineScan
Win32.FraudTool.Venisoft
Win32.FraudTool.Webtos
Win32.FraudTool.Widebiz
Win32.FraudTool.WindowsBackgroundProtector
Win32.FraudTool.WindowsDebugSystem
Win32.FraudTool.WindowsDefenceCenter
Win32.FraudTool.WindowsDiagnostics
Win32.FraudTool.WindowsEfficiencyManager
Win32.FraudTool.WindowsErrorCorrection
Win32.FraudTool.WindowsExpansionSystem
Win32.FraudTool.WindowsPassportUtility
Win32.FraudTool.WindowsPerformanceManager
Win32.FraudTool.WindowsPowerExpansion
Win32.FraudTool.WindowsRecovery
Win32.FraudTool.WindowsRemedy
Win32.FraudTool.WindowsServantSystem
Win32.FraudTool.WindowsSimpleProtector
Win32.FraudTool.WindowsStabilityCenter
Win32.FraudTool.WindowsSupportSystem
Win32.FraudTool.WindowsThreatsRemoving
Win32.FraudTool.WindowsTroublemakersAgent
Win32.FraudTool.WindowsTroublesAnalyzer
Win32.FraudTool.WindowsTroublesRemover
Win32.FraudTool.XPHomeSecurity

TROJANS
Trojans (also known as Trojan Horses) are programs that appear to do one thing but actually do another. Trojans may also download additional files to the infected system.
Win32.Trojan.Af
Win32.Trojan.Banepot
Win32.Trojan.Dm
Win32.Trojan.Faketao
Win32.Trojan.Faketest
Win32.Trojan.Fibedol
Win32.Trojan.Hosts2
Win32.Trojan.Iserv
Win32.Trojan.Kuang
Win32.Trojan.Nedovb
Win32.Trojan.Rsvr
Win32.Trojan.Servstar
Win32.Trojan.Smitnyl
Win32.Trojan.Sokiron
Win32.Trojan.Supergaga
Win32.Trojan.Virtumonde
Win32.Trojan.Xocry

TROJANDDOS
TrojanDDoS applicaitons provides functionality that makes it possible for an attacker to send massive amount of data to a specific target. The flooding of a target may for an example disturb communication services or make various systems unresponsive.
Win32.TrojanDDoS.Angryping
Win32.TrojanDDoS.Zz

DOWNLOADERS
Downloaders are programs designed to retrieve and install additional files. Downloaders can be useful tools for consumers to automate upgrades of essential software such as operating system upgrades, browsers, anti-virus applications, anti-spyware tools, games and other useful applications. Unauthorized downloaders are used by third parties to download potentially unwanted software without user notification or consent.
Win32.TrojanDownloader.Braz
Win32.TrojanDownloader.Deliver
Win32.TrojanDownloader.Goo
Win32.TrojanDownloader.Rubinurd
Win32.TrojanDownloader.Zaccess

PASSWORD STEALERS
Password stealers can steal user passwords on an infected system, compromising system security and user privacy.
Win32.TrojanPWS.Mailstealer
Win32.TrojanPWS.Rit
Win32.TrojanPWS.Yahu

TROJANSPIES
Trojan.Spy is a type of malicious program that can steal information such as passwords, surfing habits, credit card details and email addresses.
Win32.TrojanSpy.Golns
Win32.TrojanSpy.Joyalrim
Win32.TrojanSpy.Mailagent
Win32.TrojanSpy.Qproxy

WORMS
Worms are network malware, primarily replicating on networks. Usually, a worm will execute itself automatically on a remote machine without any extra help from a user. However, there are worms, such as mass-mailer worms, that will not always automatically execute themselves without the help of a user.
Win32.Worm.Shakblades

MISCELLANEOUS MALWARE
This grouping contains other programs with malicious intentions.
Win32.Hoax.Smsupd
Win32.Rootkit.Fisp
Win32.TrojanMailfinder.Spabot
Win32.TrojanRansom.Cryit
Win32.TrojanRansom.Mbblocker
Win32.TrojanRansom.Pornoasset
Win32.TrojanRansom.Vkont
Win32.TrojanRansom.Zoblocker