Protect your privacy with new targets for October 2009 (0149.0047-0149.0070)

by Albin on October 13th, 2009 in Definition File Updates.

Newly created families for October (0149.0047-0149.0070)


ADWARE

Adware is a type of advertising display software that delivers advertising content potentially in a manner or context that may be unexpected and unwanted by users. Many adware applications also perform tracking functions, and therefore may also be categorized as tracking technologies. Some consumers may want to remove adware if they object to such tracking, do not wish to see the advertising caused by the program, or are frustrated by its effects on system performance.

Win32.Adware.AdultPages
Win32.Adware.Adzul
Win32.Adware.Buscabar
Win32.Adware.CableMonkey
Win32.Adware.Cmpsky
Win32.Adware.FunkyEmoticons
Win32.Adware.Gigolo
Win32.Adware.HelpExpress
Win32.Adware.IEDriver
Win32.Adware.Ikena
Win32.Adware.Jusou
Win32.Adware.Nocsbar
Win32.Adware.Ntasrch
Win32.Adware.PlusBag
Win32.Adware.PointAd
Win32.Adware.PopMenu
Win32.Adware.Referenco
Win32.Adware.Savingrad
Win32.Adware.SkipX
Win32.Adware.Spector
Win32.Adware.SponLink
Win32.Adware.SpySpot
Win32.Adware.VcZero
Win32.Adware.Webstars
Win32.Adware.WinThirtyTwo
Win32.Adware.Wowlabar
Win32.Adware.YayaShow
Win32.Adware.Yousi

 

BACKDOORS

Backdoors may open up ports on the compromised computer, allowing remote access and control of the victim's machine.

Win32.Backdoor.Bredavi
Win32.Backdoor.Darkshell
Win32.Backdoor.Emegrab
Win32.Backdoor.FTPCasus
Win32.Backdoor.Goolbot
Win32.Backdoor.Hetmon
Win32.Backdoor.Ibome
Win32.Backdoor.Muharam
Win32.Backdoor.Netcontroller
Win32.Backdoor.Ripgof
Win32.Backdoor.Scrab
Win32.Backdoor.Syrutrk
 


DIALERS

Any program that utilizes a computer's modem to make calls or access services. Users may want to remove Dialers that dial without the user's active involvement, resulting in unexpected telephone charges and/or cause access to unintended and unwanted content.

Win32.Dialer.Bienvenido
Win32.Dialer.Highspeeddialer
Win32.Dialer.Icomp
Win32.Dialer.Ivadial
Win32.Dialer.Msvdm
Win32.Dialer.Sexdialer   


DOWNLOADERS

Downloaders are programs designed to retrieve and install additional files. Downloaders can be useful tools for consumers to automate upgrades of essential
software such as operating system upgrades, browsers, anti-virus applications, anti-spyware tools, games and other useful applications. Unauthorized downloaders are used by third parties to download potentially unwanted software without user notification or consent.

Win32.TrojanDownloader.Fakeexpl
Win32.TrojanDownloader.Genome
Win32.TrojanDownloader.Hosam
Win32.TrojanDownloader.NSISFraudload
Win32.TrojanDownloader.Poni
Win32.TrojanDownloader.Qhost
Win32.TrojanDownloader.Servill
Win32.TrojanDownloader.Sova
Win32.TrojanDownloader.Spygame
Win32.TrojanDownloader.Updsys
Win32.TrojanDownloader.Whomp


FLOODERS

Flooders may provide functionality that makes it possible for an attacker to send massive amount of data to a specific target. The flooding of a target may for an example disturb communication services or make various systems unresponsive. This is similar to a DDoS attack where a massive amounts of calls are launched against a system. A DDos attack may even make large systems unresponsive if the attack is launched from several computer systems that are infected by a DDoS capable Trojan Horse.   

Win32.EmailFlooder.Hasmailer

 

MONITORS

Monitors are surveillance tools that for example monitors users keystrokes and it therefore may compromise user privacy if it is used in a bad manner.

Win32.Monitor.HandyKeylogger

PASSWORD STEALERS

Password stealers can steal user passwords on an infected system, compromising system security and user privacy.

Win32.TrojanPWS.AntiLogger
Win32.TrojanPWS.Autoit
Win32.TrojanPWS.Fakeskype
Win32.TrojanPWS.Hapday
Win32.TrojanPWS.Mfirst
Win32.TrojanPWS.Mynet


ROUGE ANTI-SPYWARE APPLICATIONS

Rogue anti-spyware applications may give exaggerated threat reports on the
compromised computer, and then ask the user to purchase a registered version
to remove those reported threats.

Win32.FraudTool.AlphaAntivirus
Win32.FraudTool.AnispywareMaster
Win32.FraudTool.AntiMalware
Win32.FraudTool.AntivirusPro2010
Win32.FraudTool.HomePersonalAntivirus
Win32.FraudTool.RegistryFox
Win32.FraudTool.RegTool
Win32.FraudTool.SafeFighter
Win32.FraudTool.SafetyCenter
Win32.FraudTool.SaveArmor
Win32.FraudTool.SaveDefender
Win32.FraudTool.SaveKeeper
Win32.FraudTool.SecureWarrior
Win32.FraudTool.SecuritySoldier
Win32.FraudTool.SecurityTool
Win32.FraudTool.SoftSafeness
Win32.FraudTool.TrustCop
Win32.FraudTool.TrustFighter
Win32.FraudTool.TrustSoldier
Win32.FraudTool.TrustWarrior
Win32.FraudTool.WindOptimzer
Win32.FraudTool.WinRegPro


TROJANS

Trojans (also known as Trojan Horses) are programs that appear to do one thing but actually do another. Trojans may also download additional files to the infected system.

Win32.Trojan.BATAgent
Win32.Trojan.BATZapchast
Win32.Trojan.Cd_open
Win32.Trojan.Cosmu
Win32.Trojan.Cossta
Win32.Trojan.Fakewarn
Win32.Trojan.Loror
Win32.Trojan.Mepaow
Win32.Trojan.Netshare
Win32.Trojan.Opachki
Win32.Trojan.Plapon
Win32.Trojan.Powerpointer
Win32.Trojan.Registrator
Win32.Trojan.Scar
Win32.Trojan.Screensaver
Win32.Trojan.Siscos
Win32.Trojan.Skillis
Win32.Trojan.Zmunik


TROJAN.CLICKERS

Trojan.Clicker’s may cause the victims machine to contact a target webpage without the users knowledge or consent to falsify data about the number of times the webpage is visited.

Win32.TrojanClicker.Lowzones


TROJANDDOS

TrojanDDoS applicaitons provides functionality that makes it possible for an attacker
to send massive amount of data to a specific target. The flooding of a target may for an example disturb communication services or make various systems unresponsive.

Win32.TrojanDDoS.Attrack


TROJANDROPPERS

Trojan.Droppers will drop additional files on the infected system. These files are often other trojans or downloaders.

Win32.TrojanDropper.Drover
Win32.TrojanDropper.Hdrop
Win32.TrojanDropper.Irsd
Win32.TrojanDropper.Kwotc
Win32.TrojanDropper.Ndiser   


TROJANPROXY'S

Trojan.Proxy's may open up the infected machine to be used as a proxy server.   

Win32.TrojanProxy.Ukstories


TROJANSPIES

Trojan.Spy is a type of malicious program that can steal information such as passwords, surfing habits, credit card details and email addresses.

Win32.TrojanSpy.Diabloii
Win32.TrojanSpy.Lsp
Win32.TrojanSpy.Malabas
Win32.TrojanSpy.Nsm
Win32.TrojanSpy.Sigatar
Win32.TrojanSpy.Skyper


WORMS

Worms are network malware, primarily replicating on networks. Usually, a worm will
execute itself automatically on a remote machine without any extra help from a user.
However, there are worms, such as mass-mailer worms, that will not always automatically execute themselves without the help of a user.

Win32.Worm.AdwareAgent
Win32.Worm.Buffoner
Win32.Worm.Butileg
Win32.Worm.Bybz
Win32.Worm.Dpservx
Win32.Worm.Hteibook
Win32.Worm.Tdownland


MISCELLANEOUS MALWARE

This grouping contains other programs with malicious intentions.

Win32.Rootkit.Hodprot
Win32.Rootkit.Jamilla
Win32.Rootkit.Twenty
Win32.Rootkit.Umfshide
Win32.Toolbar.Kuaiso