Protect your privacy with new targets for November 2008 (0132.0000-0139.0000)

by Albin on November 14th, 2008 in Definition File Updates.

Protect your privacy with new targets for November 2008 (0132.0000-0139.0000)

Newly created families for November (0132.0000-0139.0000)

ADWARE

Adware is a type of advertising display software that delivers advertising content potentially in a manner or context that may be unexpected and unwanted by users. Many adware applications also perform tracking functions, and therefore may also be categorized as tracking technologies. Some consumers may want to remove adware if they object to such tracking, do not wish to see the advertising caused by the program, or are frustrated by its effects on system performance.

Adware.Bitroll
Adware.Dap
Adware.FakeInstaller
Adware.MXLiveMedia
Adware.PopShow
Adware.Winfetcher

BACKDOORS

Backdoors may open up ports on the compromised computer, allowing remote access and control of the victim's machine.

Win32.Backdoor.Beasty
Win32.Backdoor.Beizhu
Win32.Backdoor.Cowrat
Win32.Backdoor.Doker
Win32.Backdoor.Eklips
Win32.Backdoor.Fasec
Win32.Backdoor.FatBot
Win32.Backdoor.Genlot
Win32.Backdoor.Hacarun
Win32.Backdoor.Psyche
Win32.Backdoor.Reklam
Win32.Backdoor.Shady
Win32.Backdoor.Spyche
Win32.Backdoor.SpyNet
Win32.Backdoor.Tometa
Win32.Backdoor.Zdemon

DOWNLOADERS

Downloaders are programs designed to retrieve and install additional files. Downloaders can be useful tools for consumers to automate upgrades of essential software such as operating system upgrades, browsers, anti-virus applications, anti-spyware tools, games and other useful applications. Unauthorized downloaders are used by third parties to download potentially unwanted software without user notification or consent.

Win32.TrojanDownloader.Cosno
Win32.TrojanDownloader.Dlkroha
Win32.TrojanDownloader.DlLooee
Win32.TrojanDownloader.Fakescan
Win32.TrojanDownloader.InteXP
Win32.TrojanDownloader.Jman
Win32.TrojanDownloader.Meet
Win32.TrojanDownloader.Minidown
Win32.TrojanDownloader.Razer
Win32.TrojanDownloader.Reanimator

FLOODERS

Flooders may provide functionality that makes it possible for an attacker to send massive amounts of data to a specific target. The flooding of a target may, for example, disturb communication services or make various systems unresponsive.
This is similar to a DDoS attack where massive amounts of calls are launched against a system. A DDos attack may even make large systems unresponsive if the attack is launched from several computer systems that are infected by a DDoS capable Trojan Horse.

Win32.EmailFlooder.Kcuf
Win32.Flooder.Oscar
Win32.Flooder.RoomDestroyer

PASSWORD STEALERS

Password stealers can steal user passwords on an infected system, compromising system security and user privacy.

Win32.TrojanPWS.Autel
Win32.TrojanPWS.Juki
Win32.TrojanPWS.MMdiv
Win32.TrojanPWS.OnlineAM
Win32.TrojanPWS.Sagutin
Win32.TrojanPWS.Steal
Win32.TrojanPWS.Tmp636

ROUGE ANTI-SPYWARE APPLICATIONS

Rogue anti-spyware applications may give exaggerated threat reports on the compromised computer, and then ask the user to purchase a registered version to remove those reported threats.

AntispyKnight
AntivirusPro2009
InternetAntivirusPro
PCDefender2008
PersonalDefender2009
ProAntispyware2009
RapidAntivirus
UltraAntivirus2009
WinDefender2009
WiniGuard

TROJANS

Trojans (also known as Trojan Horses) are programs that appear to do one thing but actually do another. Trojans may also download additional files to the infected system.

Win32.Trojan.Aimlog
Win32.Trojan.Bureak
Win32.Trojan.Cascade
Win32.Trojan.Delux
Win32.Trojan.Humor
Win32.Trojan.IEFake
Win32.Trojan.IELaunch
Win32.Trojan.KillDVDTool
Win32.Trojan.Lighty
Win32.Trojan.Maccess
Win32.Trojan.Meslice
Win32.Trojan.Ozdok
Win32.Trojan.Refpron
Win32.Trojan.Regchange
Win32.Trojan.Slenfbot
Win32.Trojan.TaskDisabler
Win32.Trojan.Wabbit
Win32.Trojan.Virtob
Win32.Trojan.Xema

TROJANDDoS

TrojanDDoS applicaitons provides functionality that makes it possible for an attacker to send massive amount of data to a specific target. The flooding of a target may for an example disturb communication services or make various systems unresponsive.

Win32.TrojanDDoS.Fram

TROJAN.DROPPERS

Trojan.Droppers will drop additional files on the infected system. These files are often other Trojans or downloaders.

Win32.TrojanDropper.BingoVid
Win32.TrojanDropper.Chang
Win32.TrojanDropper.Cheita
Win32.TrojanDropper.Emin
Win32.TrojanDropper.Hosts
Win32.TrojanDropper.Keylogger
Win32.TrojanDropper.Ppink
Win32.TrojanDropper.SearchProtection
Win32.TrojanDropper.ShellStar
Win32.TrojanDropper.Startline
Win32.TrojanDropper.Ying

TROJAN.SPIES

Trojan.Spies are a type of malicious program that can steal information such as passwords, surfing habits, credit card details and e-mail addresses.

Win32.TrojanSpy.Logger
Win32.TrojanSpy.Mimailer

WORMS

Worms are network malware, primarily replicating on networks. Usually, a worm will execute itself automatically on a remote machine without any extra help from a user. However, there are worms, such as mass-mailer worms, that will not always automatically execute themselves without the help of a user.

Win32.Worm.Amiricil
Win32.Worm.Aspxor
Win32.Worm.Chode
Win32.Worm.Detnat
Win32.Worm.Fabot
Win32.Worm.FlyStudio
Win32.Worm.Gimmiv
Win32.Worm.Guap
Win32.Worm.Heher
Win32.Worm.Huhk
Win32.Worm.Joleee
Win32.Worm.KdCrypt
Win32.Worm.Netop
Win32.Worm.Panoil
Win32.Worm.Sasser
Win32.Worm.Shypan
Win32.Worm.Xatch
Win32.Worm.Yalat
Win32.P2PWorm.Bacteraloh
Win32.P2PWorm.Xoxo

TROJAN.CLICKERS

Trojan.Clickers may cause the victims machine to contact a target webpage without the users knowledge or consent to falsify data about the number of times the webpage is visited.

Win32.TrojanClicker.Goweles

MISCELLANEOUS MALWARE

This grouping contains other programs with malicious intentions.

HTML.Exploit.Agent
HTML.Exploit.IESlice
HTML.TrojanClicker.Iframe
SymbOS.Trojan.Smsanywher
Win32.Exploit.CAN
Win32.Exploit.DCom
Win32.Exploit.Jpedrop
Win32.Exploit.PrinterOverflow
Win32.Hoax.Gsmgen
Win32.Nuker.Voidozer
Win32.Rootkit.Cutwail
Win32.Rootkit.Mag
Win32.Rootkit.Pakes
Win32.Rootkit.SMA
Win32.Rootkit.Small
Win32.Rootkit.Vanti
Win32.SpamTool.Delf
Win32.SpamTool.Myspamce