Protect your privacy with new targets for November 2010

by Andy on December 17th, 2010 in .

Newly created families for November 2010


ADWARE
Adware is a type of advertising display software that delivers advertising content potentially in a manner or context that may be unexpected and unwanted by users. Many adware applications also perform tracking functions, and therefore may also be categorized as tracking technologies. Some consumers may want to remove adware if they object to such tracking, do not wish to see the advertising caused by the program, or are frustrated by its effects on system performance.


Win32.Adware.Csa
Win32.Adware.Exact
Win32.Adware.Friender
Win32.Adware.IEKeyWord
Win32.Adware.IEPlus
Win32.Adware.NSIS
Win32.Adware.QuickBar
Win32.Adware.WeatherBug
Win32.Adware.WhileSurf
Win32.Adware.WorldAnywhere
Win32.Adware.YapBrowser


BACKDOORS
Backdoors may open up ports on the compromised computer, allowing remote access and control of the victim's machine.


IRC.Backdoor.Botya
IRC.Backdoor.Final
IRC.Backdoor.Netz
IRC.Backdoor.RpcBot
IRC.Backdoor.Yobot
MSIL.Backdoor.Torbot
Win32.Backdoor.Beyonbot
Win32.Backdoor.Buratin
Win32.Backdoor.DarkShade
Win32.Backdoor.Loxoscam
Win32.Backdoor.Memos
Win32.Backdoor.Moguran
Win32.Backdoor.NeoRAT
Win32.Backdoor.Qzor
Win32.Backdoor.SilverFTP
Win32.Backdoor.Spion4
Win32.Backdoor.Telam
Win32.Backdoor.Wolfdor


DIALERS
Any program that utilizes a computer's modem to make calls or access services. Users may want to remove Dialers that dial without the user's active involvement, resulting in unexpected telephone charges and/or cause access to unintended and unwanted content. 


Win32.Dialer.STT


DOWNLOADERS
Downloaders are programs designed to retrieve and install additional files. Downloaders can be useful tools for consumers to automate upgrades of essential software such as operating system upgrades, browsers, anti-virus applications, anti-spyware tools, games and other useful applications. Unauthorized downloaders are used by third parties to download potentially unwanted software without user notification or consent.


MSIL.TrojanDownloader.Vkont
Win32.TrojanDownloader.Bulilit
Win32.TrojanDownloader.Leaktest


FLOODERS
Flooders may provide functionality that makes it possible for an attacker to send massive amount of data to a specific target. The flooding of a target may for an example disturb communication services or make various systems unresponsive. This is similar to a DDoS attack where a massive amounts of calls are launched against a system. A DDos attack may even make large systems unresponsive if the attack is launched from several computer systems that are infected by a DDoS capable Trojan Horse. 


IRC.Flooder.IRCSpam
Win32.Flooder.Mega
Win32.Flooder.TyaProto
Win32.EmailFlooder.Homicide
Win32.EmailFlooder.Labean


MONITORS
Monitors are surveillance tools that for example monitors users keystrokes and it therefore may compromise user privacy if it is used in a bad manner.


Win32.Monitor.BigBrother
Win32.Monitor.KeyLog
Win32.Monitor.ProBot


PASSWORD STEALERS
Password stealers can steal user passwords on an infected system, compromising system security and user privacy.


Win32.TrojanPWS.Alipay
Win32.TrojanPWS.Apsend
Win32.TrojanPWS.Foran
Win32.TrojanPWS.KeySpy
Win32.TrojanPWS.Perforld



ROGUE ANTI-SPYWARE APPLICATIONS
Rogue anti-spyware applications may give exaggerated threat reports on the compromised computer, and then ask the user to purchase a registered version to remove those reported threats.


Win32.FraudTool.AntiVirus8
Win32.FraudTool.AVaccine
Win32.FraudTool.DirectVaccine
Win32.FraudTool.DiskDoctor
Win32.FraudTool.HardDriveDiagnostic
Win32.FraudTool.HDDDiagnostic
Win32.FraudTool.HDDPlus
Win32.FraudTool.PersonalSecuritySentinel
Win32.FraudTool.PrivacyCorrector
Win32.FraudTool.SecurityShield
Win32.FraudTool.SmartHDD
Win32.FraudTool.VaccineZone
Win32.FraudTool.WorldSecurityOnline


TROJANS
Trojans (also known as Trojan Horses) are programs that appear to do one thing but actually do another. Trojans may also download additional files to the infected system.


BAT.Trojan.DelDisk
Win32.Trojan.Cen
Win32.Trojan.FileCrypt
Win32.Trojan.Huzar
Win32.Trojan.Lukicsel
Win32.Trojan.PhishingCreator
Win32.Trojan.Soph
Win32.Trojan.UPnP
Win32.TrojanIM.Hinter
Win32.TrojanIM.Lunix


TROJAN.CLICKERS
Trojan.Clicker’s may cause the victims machine to contact a target webpage without the users knowledge or consent to falsify data about the number of times the webpage is visited.


JS.TrojanClicker.Small


TROJANDDOS
TrojanDDoS applicaitons provides functionality that makes it possible for an attacker to send massive amount of data to a specific target. The flooding of a target may for an example disturb communication services or make various systems unresponsive.


Win32.TrojanDDoS.AcidX


TROJANDROPPERS
Trojan.Droppers will drop additional files on the infected system. These files are often other trojans or downloaders. 


Win32.TrojanDropper.Bonys
Win32.TrojanDropper.Haed
Win32.TrojanDropper.Lesper


TROJANPROXY'S
Trojan.Proxy's may open up the infected machine to be used as a proxy server. 


Win32.TrojanProxy.Coco


TROJANSPIES
Trojan.Spy is a type of malicious program that can steal information such as passwords, surfing habits, credit card details and email addresses.


Win32.TrojanSpy.AimVision
Win32.TrojanSpy.Banaris
Win32.TrojanSpy.Heles
Win32.TrojanSpy.KeyKeeper
Win32.TrojanSpy.Lpxenur
Win32.TrojanSpy.MayBeg


WORMS
Worms are network malware, primarily replicating on networks. Usually, a worm will execute itself automatically on a remote machine without any extra help from a user. However, there are worms, such as mass-mailer worms, that will not always automatically execute themselves without the help of a user.


Win32.EmailWorm.AltIce
Win32.IMWorm.Banker
Win32.IMWorm.Nemasana
Win32.Worm.Lyndegg
Win32.Worm.Span
Win32.Worm.Swar



MISCELLANEOUS MALWARE
This grouping contains other programs with malicious intentions.


JS.BadJoke.RJump
Win32.BadJoke.FakeKAV
Win32.BadJoke.Farce
Win32.BadJoke.Melter
Win32.BadJoke.Soup
Win32.BadJoke.TMouse
BAT.TrojanRansom.Agent
Win32.TrojanRansom.HmBlocker
Win32.TrojanRansom.HonestBlocker
Win32.TrojanRansom.Losya
Win32.TrojanRansom.PornoCodec
Win32.TrojanRansom.Timer
Win32.Exploit.CVE-2010-3654