Protect your privacy with new targets for October 2010

by Andy on November 23rd, 2010 in .

ADWARE


Adware is a type of advertising display software that delivers advertising content potentially in a manner or context that may be unexpected and unwanted by users.
Many adware applications also perform tracking functions, and therefore may also be categorized as tracking technologies. Some consumers may want to remove adware if they object to such tracking, do not wish to see the advertising caused by the program, or are frustrated by its effects on system performance.


Win32.Adware.FlyTube
Win32.Adware.Scud
Win32.Adware.StopZilla
Win32.Adware.WizSearch
MSIL.Adware.Surfer


BACKDOORS


Backdoors may open up ports on the compromised computer, allowing remote access and control of the victim's machine.


Win32.Backdoor.Lavandos
Win32.Backdoor.LegendMir
Win32.Backdoor.Madistor
Win32.Backdoor.MimimiBot
Win32.Backdoor.Pucodec
Win32.Backdoor.Vecebot
ASP.Backdoor.Cmdkill
ASP.Backdoor.Evspy
ASP.Backdoor.FileUpload
ASP.Backdoor.Grasp
ASP.Backdoor.Kodlama
ASP.Backdoor.Rootkit
ASP.Backdoor.Small
ASP.Backdoor.Titshell
ASP.Backdoor.Webadmin
ASP.Backdoor.Webshell


DOWNLOADERS


Downloaders are programs designed to retrieve and install additional files. Downloaders can be useful tools for consumers to automate upgrades of essential software such as operating system upgrades, browsers, anti-virus applications, anti-spyware tools, games and other useful applications. Unauthorized downloaders are used by third parties to download potentially unwanted software without user notification or consent.


Win32.TrojanDownloader.Bespal
Win32.TrojanDownloader.Feiyo
Win32.TrojanDownloader.Fosniw
Win32.TrojanDownloader.Injepe
JS.TrojanDownloader.ActiveX
JS.TrojanDownloader.Cobase
JS.TrojanDownloader.Gumblar
JS.TrojanDownloader.Pegal
JS.TrojanDownloader.Remora
JS.TrojanDownloader.Shadraem
JS.TrojanDownloader.Small
JS.TrojanDownloader.Twetti
MSIL.TrojanDownloader.Crypted


MONITORS


Monitors are surveillance tools that for example monitors users keystrokes and it therefore may compromise user privacy if it is used in a bad manner.


Win32.Monitor.ShadowKeylogger


PASSWORD STEALERS


Password stealers can steal user passwords on an infected system, compromising system
security and user privacy.


Win32.TrojanPWS.Lox


ROGUE ANTI-SPYWARE APPLICATIONS


Rogue anti-spyware applications may give exaggerated threat reports on the compromised computer, and then ask the user to purchase a registered version to remove those reported threats.


Win32.FraudTool.AntivirusIS
Win32.FraudTool.AntivirusStudio
Win32.FraudTool.RegistryClever
Win32.FraudTool.ShieldSoldier
Win32.FraudTool.SmartEngine
Win32.FraudTool.SystemDefragmenter
Win32.FraudTool.ThinkPoint


TROJANS


Trojans (also known as Trojan Horses) are programs that appear to do one thing but actually do another. Trojans may also download additional files to the infected system.


Win32.Trojan.Eckut
Win32.Trojan.Flup
Win32.Trojan.FTPharv
Win32.Trojan.Pakun
Win32.Trojan.Qqad
Win32.Trojan.Ramnit
Win32.Trojan.Rebhip
Win32.Trojan.Shugol
Win32.Trojan.SpyRat
Win32.Trojan.Totentas
Win32.Trojan.Visal
ASP.Trojan.Agent
BAT.Trojan.Dai
BAT.Trojan.Vitco
IRC.Trojan.Agent
JS.Trojan.Cardst
JS.Trojan.Popupper
JS.Trojan.Redirector
MSIL.Trojan.StartPage
PIF.Trojan.Starter


TROJAN.CLICKERS


Trojan.Clickers may cause the victims machine to contact a target webpage without the users knowledge or consent to falsify data about the number of times the webpage is visited.


Win32.TrojanClicker.Wistler
JS.TrojanClicker.Linker


TROJANDROPPERS


Trojan.Droppers will drop additional files on the infected system. These files are often other trojans or downloaders. 


Win32.TrojanDropper.Cadro
Win32.TrojanDropper.Monya
Win32.TrojanDropper.Pasdon
VBS.TrojanDropper.Pdfka


TROJANSPIES


Trojan.Spy is a type of malicious program that can steal information such as passwords, surfing habits, credit card details and email addresses.


Win32.TrojanSpy.carberp
Perl.TrojanSpy.Agent


WORMS


Worms are network malware, primarily replicating on networks. Usually, a worm will execute itself automatically on a remote machine without any extra help from a user. However, there are worms, such as mass-mailer worms, that will not always automatically execute themselves without the help of a user.


Win32.Worm.Masbert
Win32.P2PWorm.DataRape
Acad.Worm.HighLight
JS.EmailWorm.Gigger
VBS.EmailWorm.Elva
VBS.EmailWorm.Filis
VBS.EmailWorm.Goma
VBS.EmailWorm.KakWorm
VBS.EmailWorm.Natiday
VBS.EmailWorm.Proud
VBS.EmailWorm.WhiteHome


MISCELLANEOUS MALWARE


This grouping contains other programs.


JS.Exploit.Ffhang
JS.Exploit.FileProxy
MSIL.Exploit.Agent
VBS.TrojanRansom.FlyKiss
Win32.BadJoke.Bear
Win32.Exploit.AdobeReader
Win32.Hoax.Baton
Win32.Toolbar.Agent
Win32.Toolbar.Doggy
Win32.Toolbar.Iminent
Win32.Toolbar.TinyToolbar
Win32.TrojanIM.Spoil
Win32.TrojanRansom.Vkonte