Protect your privacy with new targets for December 2010

by Andy on January 20th, 2011 in Definition File Updates.

Newly created families for December 2010


ADWARE
Adware is a type of advertising display software that delivers advertising content potentially in a manner or context that may be unexpected and unwanted by users. Many adware applications also perform tracking functions, and therefore may also be categorized as tracking technologies. Some consumers may want to remove adware if they object to such tracking, do not wish to see the advertising caused by the program, or are frustrated by its effects on system performance


Win32.Adware.EroPics
Win32.Adware.Gaba
Win32.Adware.IEKeyWord
Win32.Adware.Onbar



BACKDOORS
Backdoors may open up ports on the compromised computer, allowing remote access and control of the victim's machine.


Win32.Backdoor.Clemag
Win32.Backdoor.Tierry
Win32.Backdoor.Vinself



DOWNLOADERS
Downloaders are programs designed to retrieve and install additional files. Downloaders can be useful tools for consumers to automate upgrades of essential software such as operating system upgrades, browsers, anti-virus applications, anti-spyware tools, games and other useful applications. Unauthorized downloaders are used by third parties to download potentially unwanted software without user notification or consent.


Win32.TrojanDownloader.Gamup
Win32.TrojanDownloader.Hopa
Win32.TrojanDownloader.Leaktest
Win32.TrojanDownloader.Mabu
Win32.TrojanDownloader.Nuo
Win32.TrojanDownloader.Winfixer



FLOODERS
Flooders may provide functionality that makes it possible for an attacker to send massive amount of data to a specific target. The flooding of a target may for an example disturb communication services or make various systems unresponsive. This is similar to a DDoS attack where a massive amounts of calls are launched against a system. A DDos attack may even make large systems unresponsive if the attack is launched from several computer systems that are infected by a DDoS capable Trojan Horse. 


Win32.EmailFlooder.Mailagent


PASSWORD STEALERS
Password stealers can steal user passwords on an infected system, compromising system security and user privacy.


MSIL.TrojanPWS.FireThief
Win32.TrojanPWS.Alipay
Win32.TrojanPWS.Perforld



ROGUE ANTI-SPYWARE APPLICATIONS
Rogue anti-spyware applications may give exaggerated threat reports on the compromised computer, and then ask the user to purchase a registered version to remove those reported threats.


Win32.FraudTool.AntiVirus8
Win32.FraudTool.AVaccine
Win32.FraudTool.DirectVaccine
Win32.FraudTool.DiskDoctor
Win32.FraudTool.HardDriveDiagnostic
Win32.FraudTool.HDDDiagnostic
Win32.FraudTool.HDDPlus
Win32.FraudTool.InternetAntivirus2011
Win32.FraudTool.InternetSecurity2011
Win32.FraudTool.PersonalSecuritySentinel
Win32.FraudTool.PrivacyCorrector
Win32.FraudTool.PrivacyGuard
Win32.FraudTool.SecurityShield
Win32.FraudTool.SmartHDD
Win32.FraudTool.SystemPro2011
Win32.FraudTool.WindowsOptimizationCenter


TROJANS
Trojans (also known as Trojan Horses) are programs that appear to do one thing but actually do another. Trojans may also download additional files to the infected system.


Win32.Trojan.Cen
Win32.Trojan.Commonname
Win32.Trojan.Jorik
Win32.Trojan.Monagray
Win32.Trojan.Ottodex
Win32.Trojan.Sysler
Win32.Trojan.Topantispyware



TROJANDROPPERS
Trojan.Droppers will drop additional files on the infected system. These files are often other trojans or downloaders. 


Win32.TrojanDropper.Bonys
Win32.TrojanDropper.Jara
Win32.TrojanDropper.Javdrop


TROJANPROXIES
TrojanProxies may open up the infected machine to be used as a proxy server. 


Win32.TrojanProxy.Glukelira
Win32.TrojanProxy.Portram
Win32.TrojanProxy.Puma 



TROJANSPIES
Trojan.Spy is a type of malicious program that can steal information such as passwords, surfing habits, credit card details and email addresses.


Win32.TrojanSpy.Emailgrabber
Win32.TrojanSpy.Farko
Win32.TrojanSpy.Heles
Win32.TrojanSpy.Perfloger
Win32.TrojanSpy.Wostel



WORMS
Worms are network malware, primarily replicating on networks. Usually, a worm will execute itself automatically on a remote machine without any extra help from a user. However, there are worms, such as mass-mailer worms, that will not always automatically execute themselves without the help of a user.


Win32.Worm.Lyndegg
Win32.P2PWorm.Fubos
Win32.P2PWorm.Polip
Win32.P2PWorm.Socks


MISCELLANEOUS MALWARE
This grouping contains other programs with malicious intentions.


BAT.TrojanRansom.Agent
DashWorlds
Win32.Exploit.CVE-2010-3654
Win32.Flooder.Vk
Win32.Hoax.Badjoke
Win32.Hoax.Odnoklagent
Win32.RiskTool.HideProc
Win32.Toolbar.SearchQU
Win32.Toolbar.Try2Find
Win32.TrojanIM.Hinter
Win32.TrojanRansom.Adochi
Win32.TrojanRansom.HmBlocker
Win32.TrojanRansom.HonestBlocker
Win32.TrojanRansom.Losya
Win32.TrojanRansom.Transparenom