Protect your privacy with new targets for November 2009 (0149.0070-0149.0089)

by Albin on November 9th, 2009 in Definition File Updates.

Newly created families for November 2009 (0149.0070-0149.0089)

ADWARE

Adware is a type of advertising display software that delivers advertising content potentially in a manner or context that may be unexpected and unwanted by users. Many adware applications also perform tracking functions, and therefore may also be categorized as tracking technologies. Some consumers may want to remove adware if they object to such tracking, do not wish to see the advertising caused by the program, or are frustrated by its effects on system performance.

Win32.Adware.Adwin
Win32.Adware.Bispy
Win32.Adware.Fireyads
Win32.Adware.Index
Win32.Adware.Kxso
Win32.Adware.Prodm
Win32.Adware.Tsadv
Win32.Adware.WebWarper
Win32.Adware.Wru
Win32.Adware.Yayadu

BACKDOORS

Backdoors may open up ports on the compromised computer, allowing remote access and control of the victim's machine.

Win32.Backdoor.Clampi
Win32.Backdoor.Huntah
Win32.Backdoor.Padmin
Win32.Backdoor.Tusha

DIALERS

Any program that utilizes a computer's modem to make calls or access services. Users may want to remove Dialers that dial without the user's active involvement, resulting in unexpected telephone charges and/or cause access to unintended and unwanted content.   

Win32.Dialer.Netnan
Win32.Dialer.Playground
Win32.Dialer.Webm

DOWNLOADERS

Downloaders are programs designed to retrieve and install additional files. Downloaders can be useful tools for consumers to automate upgrades of essential
software such as operating system upgrades, browsers, anti-virus applications, anti-spyware tools, games and other useful applications. Unauthorized downloaders are used by third parties to download potentially unwanted software without user notification or consent.

Win32.TrojanDownloader.Crypt
Win32.TrojanDownloader.Fiegi
Win32.TrojanDownloader.Ghostra
Win32.TrojanDownloader.Hegeny
Win32.TrojanDownloader.Ilovlan
Win32.TrojanDownloader.JSAgent
Win32.TrojanDownloader.JSFraudload
Win32.TrojanDownloader.LibPatcher
Win32.TrojanDownloader.Myworld
Win32.TrojanDownloader.NSISQQhelper
Win32.TrojanDownloader.Unruy
Win32.TrojanDownloader.Waledac
Win32.TrojanDownloader.Voila

FLOODERS

Flooders may provide functionality that makes it possible for an attacker to send massive amount of data to a specific target. The flooding of a target may for an example disturb communication services or make various systems unresponsive. This is similar to a DDoS attack where a massive amounts of calls are launched against a system. A DDos attack may even make large systems unresponsive if the attack is launched from several computer systems that are infected by a DDoS capable Trojan Horse.   

Win32.EmailFlooder.Directblaster

MONITORS

Monitors are surveillance tools that for example monitors users keystrokes and it therefore may compromise user privacy if it is used in a bad manner.

Win32.Monitor.SpyMan

PASSWORD STEALERS

Password stealers can steal user passwords on an infected system, compromising system security and user privacy.

Win32.TrojanPWS.Awdm
Win32.TrojanPWS.Dytka
Win32.TrojanPWS.Grincart
Win32.TrojanPWS.MailPassView
Win32.TrojanPWS.Pemsepos
Win32.TrojanPWS.Zuten

ROUGE ANTI-SPYWARE APPLICATIONS

Rogue anti-spyware applications may give exaggerated threat reports on the
compromised computer, and then ask the user to purchase a registered version
to remove those reported threats.

Win32.FraudTool.ActiveSecurity
Win32.FraudTool.BlockKeeper
Win32.FraudTool.BlockProtector
Win32.FraudTool.BlockScanner
Win32.FraudTool.Clear-PC
Win32.FraudTool.DesktopDefender2010
Win32.FraudTool.PCScout
Win32.FraudTool.ProtectionCube
Win32.FraudTool.ShieldSafeness
Win32.FraudTool.SoftBarrier
Win32.FraudTool.SoftCop
Win32.FraudTool.SoftStronghold
Win32.FraudTool.SoftVeteran
Win32.FraudTool.SystemFighter
Win32.FraudTool.SystemVeteran
Win32.FraudTool.TREAntivirus
Win32.FraudTool.WinBlueSoft
Win32.FraudTool.WindowsEnterpriseSuite
Win32.FraudTool.WindowsSystemDefender
Win32.FraudTool.VirusOut
Win32.FraudTool.Vistop
Win32.FraudTool.VolcanoSecuritySuite

TROJANS

Trojans (also known as Trojan Horses) are programs that appear to do one thing but actually do another. Trojans may also download additional files to the infected system.

Win32.Trojan.ACMH
Win32.Trojan.Chinky
Win32.Trojan.Iyeclore
Win32.Trojan.Kyper
Win32.Trojan.Larwa
Win32.Trojan.Mafod
Win32.Trojan.Msnetax
Win32.Trojan.Nish
Win32.Trojan.Nohupeg
Win32.Trojan.Sisproc
Win32.Trojan.Sisron
Win32.Trojan.WinCodec

TROJAN CLICKERS

Trojan.Clicker’s may cause the victims machine to contact a target webpage without the users knowledge or consent to falsify data about the number of times the webpage is visited.

Win32.TrojanClicker.Runner
Win32.TrojanClicker.Startpage

TROJANDDOS

TrojanDDoS applicaitons provides functionality that makes it possible for an attacker
to send massive amount of data to a specific target. The flooding of a target may for an example disturb communication services or make various systems unresponsive.

Win32.TrojanDDoS.Bonke

TROJANDROPPERS

Trojan.Droppers will drop additional files on the infected system. These files are often other trojans or downloaders.   

Win32.TrojanDropper.Bibi
Win32.TrojanDropper.Copit
Win32.TrojanDropper.NSISAgent
Win32.TrojanDropper.Soops
Win32.TrojanDropper.Tofta

TROJANSPIES

Trojan.Spy is a type of malicious program that can steal information such as passwords, surfing habits, credit card details and email addresses.

Win32.TrojanSpy.Banca
Win32.TrojanSpy.Elzio
Win32.TrojanSpy.JSFFSPY
Win32.TrojanSpy.Kirahu
Win32.TrojanSpy.Senev
Win32.TrojanSpy.Snanet

WORMS

Worms are network malware, primarily replicating on networks. Usually, a worm will
execute itself automatically on a remote machine without any extra help from a user.
However, there are worms, such as mass-mailer worms, that will not always automatically execute themselves without the help of a user.

Win32.Worm.Dianyz
Win32.Worm.Failnum
Win32.Worm.Mamianune
Win32.Worm.Nebeethoven
Win32.Worm.Sid
Win32.Worm.Vobfus

MISCELLANEOUS MALWARE

This grouping contains other programs with malicious intentions.

Win32.BadJoke.FakeFormat
Win32.BadJoke.Hauntpc
Win32.Rootkit.Otlard
Win32.Rootkit.TcpipHook
Win32.Rootkit.Vrdriver
Win32.Spoofer.Arp
Win32.Spoofer.Ayazz
Win32.Toolbar.Bullseye
Win32.TrojanRansom.Adfake
Win32.TrojanRansom.Cryzip
Win32.TrojanRansom.Mrstalin
Win32.TrojanRansom.Webfilter


Spyware is a program that has

User offline. Last seen 4 years 22 weeks ago.lizzymagvire
Joined: 2009-11-13
Posts: 0

Spyware is a program that has been downloaded, usually unbeknownst to you, because it can be piggy-backed with some other type of desired program, usually freeware or shareware.  Once this spyware is secretly installed on your computer it can do such things as change computer settings, track viewed websites, collect passwords, history and private information, and can even record your keystrokes.  This information is then sent back to the program’s originator or to a third party.  Spyware is extremely difficult to eradicate.