Protect your privacy with new targets for January 2010 (0149.0109-0149.0126)

by Albin on January 7th, 2010 in Definition File Updates.

Newly created families for January (0149.0109-0149.0126)

ADWARE

Adware is a type of advertising display software that delivers advertising content potentially in a manner or context that may be unexpected and unwanted by users. Many adware applications also perform tracking functions, and therefore may also be categorized as tracking technologies. Some consumers may want to remove adware if they object to such tracking, do not wish to see the advertising caused by the program, or are frustrated by its effects on system performance.

Win32.Adware.Adnur
Win32.Adware.Bridge
Win32.Adware.Coopen
Win32.Adware.DirectCard
Win32.Adware.DomPlayer
Win32.Adware.ErrorPageDir
Win32.Adware.IESearchbar
Win32.Adware.Imoney
Win32.Adware.InstantAccess
Win32.Adware.KMGuide
Win32.Adware.LeftSideBuddy
Win32.Adware.NavOct
Win32.Adware.OptMedia
Win32.Adware.SearcherSmart
Win32.Adware.WebFavoriteSite
Win32.Adware.WindowsEnhancer
Win32.Adware.Wsb

BACKDOORS

Backdoors may open up ports on the compromised computer, allowing remote access and control of the victim's machine.

Win32.Backdoor.Bidon
Win32.Backdoor.Cetorp
Win32.Backdoor.Cliback
Win32.Backdoor.Dlfxdrop
Win32.Backdoor.Fraggle
Win32.Backdoor.Gagony
Win32.Backdoor.Lomm
Win32.Backdoor.ServU-based
Win32.Backdoor.Smabo
Win32.Backdoor.Stromserv
Win32.Backdoor.YamaSpy

DIALERS

Any program that utilizes a computer's modem to make calls or access services. Users may want to remove Dialers that dial without the user's active involvement, resulting in unexpected telephone charges and/or cause access to unintended and unwanted content.   

Win32.Dialer.Celebrite
Win32.Dialer.Lickghost


DOWNLOADERS

Downloaders are programs designed to retrieve and install additional files. Downloaders can be useful tools for consumers to automate upgrades of essential
software such as operating system upgrades, browsers, anti-virus applications, anti-spyware tools, games and other useful applications.Unauthorized downloaders are used by third parties to download potentially unwanted software without user notification or consent.

Win32.TrojanDownloader.Baidload
Win32.TrojanDownloader.Climdown
Win32.TrojanDownloader.Cmtow
Win32.TrojanDownloader.Exters
Win32.TrojanDownloader.FakeInit
Win32.TrojanDownloader.MSILSmall
Win32.TrojanDownloader.Ovosh
Win32.TrojanDownloader.Piker
Win32.TrojanDownloader.Qodevx
Win32.TrojanDownloader.Radonl
Win32.TrojanDownloader.Revo
Win32.TrojanDownloader.Sema
Win32.TrojanDownloader.Sumara
Win32.TrojanDownloader.Urldistract
Win32.TrojanDownloader.VBSAgent

FLOODERS

Flooders may provide functionality that makes it possible for an attacker to send massive amount of data to a specific target. The flooding of a target may for an example disturb communication services or make various systems unresponsive. This is similar to a DDoS attack where a massive amounts of calls are launched against a system. A DDos attack may even make large systems unresponsive if the attack is launched from several computer systems that are infected by a DDoS capable Trojan Horse.   

Win32.Flooder.Assault
Win32.Flooder.Ircflood

PASSWORD STEALERS

Password stealers can steal user passwords on an infected system, compromising system security and user privacy.

Win32.TrojanPWS.Fakeicq
Win32.TrojanPWS.Jomloon
Win32.TrojanPWS.Petilam
Win32.TrojanPWS.Rapidpass


ROUGE ANTI-SPYWARE APPLICATIONS

Rogue anti-spyware applications may give exaggerated threat reports on the
compromised computer, and then ask the user to purchase a registered version
to remove those reported threats.

Win32.FraudTool.AntiSpyware2010
Win32.FraudTool.AntispywareShieldPro
Win32.FraudTool.AntiTroy
Win32.FraudTool.AntivirusPC2009
Win32.FraudTool.APCprotect
Win32.FraudTool.ContentCleaner
Win32.FraudTool.DataDoctor2010
Win32.FraudTool.DefenceLab
Win32.FraudTool.GreatDefender
Win32.FraudTool.GuardPcs
Win32.FraudTool.IGuardPc
Win32.FraudTool.InternetSecurity2010
Win32.FraudTool.LivePCCare
Win32.FraudTool.MalwareDefense
Win32.FraudTool.NoMalware
Win32.FraudTool.PCLiveGuard
Win32.FraudTool.PcsProtector
Win32.FraudTool.ProtectPcs
Win32.FraudTool.SafetyAntiSpyware
Win32.FraudTool.SiteAdware
Win32.FraudTool.SpyEraser
Win32.FraudTool.SysDefence
Win32.FraudTool.SystemCleanerPRO
Win32.FraudTool.TheDefend
Win32.FraudTool.VaccineClear
Win32.FraudTool.VaccineSystem

TROJANS

Trojans (also known as Trojan Horses) are programs that appear to do one thing but actually do another. Trojans may also download additional files to the infected system.

Win32.Trojan.Chydo
Win32.Trojan.Delfinject
Win32.Trojan.Fakems
Win32.Trojan.Formatd
Win32.Trojan.Hosts
Win32.Trojan.Kidney
Win32.Trojan.Llac
Win32.Trojan.Oner
Win32.Trojan.Openport
Win32.Trojan.Redim
Win32.Trojan.VBSAgent
Win32.Trojan.Vimot
Win32.Trojan.Vpuzus

TROJANCLICKERS

Trojan.Clicker’s may cause the victims machine to contact a target webpage without the users knowledge or consent to falsify data about the number of times the webpage is visited.

Win32.TrojanClicker.Casu
Win32.TrojanClicker.Cycler

TROJANDDOS

TrojanDDoS applicaitons provides functionality that makes it possible for an attacker to send massive amount of data to a specific target. The flooding of a target may for an example disturb communication services or make various systems unresponsive.

Win32.TrojanDDoS.Peels

TROJANDROPPERS

Trojan.Droppers will drop additional files on the infected system. These files are often other trojans or downloaders.   

Win32.TrojanDropper.Boaxxe
Win32.TrojanDropper.Cryptrun
Win32.TrojanDropper.Dropirin
Win32.TrojanDropper.Grizl
Win32.TrojanDropper.Jascript
Win32.TrojanDropper.Kobra
Win32.TrojanDropper.Pmax
Win32.TrojanDropper.Pror
Win32.TrojanDropper.Pseduoexedrop
Win32.TrojanDropper.Qandr
Win32.TrojanDropper.Regdrop
Win32.TrojanDropper.Smiscer
Win32.TrojanDropper.Vbdropler

TROJANPROXY'S

Trojan.Proxy's may open up the infected machine to be used as a proxy server.   

Win32.TrojanProxy.Dorando

TROJANSPIES

Trojan.Spy is a type of malicious program that can steal information such as passwords, surfing habits, credit card details and email addresses.

Win32.TrojanSpy.Bifibank
Win32.TrojanSpy.Burda
Win32.TrojanSpy.Icq
Win32.TrojanSpy.Lordspy
Win32.TrojanSpy.Mfox
Win32.TrojanSpy.Polyatroj
Win32.TrojanSpy.Waruiko
Win32.TrojanSpy.Webmoner

WORMS

Worms are network malware, primarily replicating on networks. Usually, a worm will
execute itself automatically on a remote machine without any extra help from a user. However, there are worms, such as mass-mailer worms, that will not always automatically execute themselves without the help of a user.


Win32.Worm.Brizol
Win32.Worm.JSXaron
Win32.Worm.Vabroran

MISCELLANEOUS MALWARE

This grouping contains other programs with malicious intentions.

HTML.TrojanSpy.Bankfraud
HTML.TrojanSpy.Bayfraud
HTML.TrojanSpy.Fraud
HTML.TrojanSpy.Paylap
HTML.TrojanSpy.Sunfraud
HTML.TrojanSpy.TCFraud
HTML.TrojanSpy.Wamufraud
Win32.Rootkit.Mym
Win32.Rootkit.Papapa
Win32.Rootkit.Pinyroot
Win32.TrojanRansom.Digitala
Win32.TrojanRansom.Lorobot
Win32.TrojanRansom.XBlocker