Protect your privacy with new targets for September 2010

by Andy on October 6th, 2010 in Definition File Updates.

Newly created families for September 2010

ADWARE

Adware is a type of advertising display software that delivers advertising content potentially in a manner or context that may be unexpected and unwanted by users. Many adware applications also perform tracking functions, and therefore may also be categorized as tracking technologies. Some consumers may want to remove adware if they object to such tracking, do not wish to see the advertising caused by the program, or are frustrated by its effects on system performance.

Win32.Adware.Appolinaria
Win32.Adware.Bonzo
Win32.Adware.Gabpath
Win32.Adware.Jumnet
Win32.Adware.MightyMagoo
Win32.Adware.Nobar
Win32.Adware.Plin
Win32.Adware.Scud
Win32.Adware.StopZilla
Win32.Adware.Sttarad

BACKDOORS

Backdoors may open up ports on the compromised computer, allowing remote access and control of the victim's machine.

Win32.Backdoor.Amatu
Win32.Backdoor.Checkweb
Win32.Backdoor.Hapig
Win32.Backdoor.Kolado
Win32.Backdoor.LegendMir
Win32.Backdoor.Netconf
Win32.Backdoor.NetCruizer
Win32.Backdoor.Quux
Win32.Backdoor.SpyEye
Win32.Backdoor.Triton
Win32.Backdoor.Yoddos
BAT.Backdoor.Teldoor

DIALERS

Any program that utilizes a computer's modem to make calls or access services. Users may want to remove Dialers that dial without the user's active involvement, resulting in unexpected telephone charges and/or cause access to unintended and unwanted content.

Win32.Dialer.Lagoon
Win32.Dialer.SexCam

DOWNLOADERS

Downloaders are programs designed to retrieve and install additional files. Downloaders can be useful tools for consumers to automate upgrades of essential
software such as operating system upgrades, browsers, anti-virus applications, anti-spyware tools, games and other useful applications. Unauthorized downloaders are used by third parties to download potentially unwanted software without user notification or consent.

Win32.TrojanDownloader.Bespal
Win32.TrojanDownloader.FinalTry
Win32.TrojanDownloader.Kach
Win32.TrojanDownloader.Libu
Win32.TrojanDownloader.Miscalin
JS.TrojanDownloader.Iframe

MONITORS

Monitors are surveillance tools that for example monitors users keystrokes and it therefore may compromise user privacy if it is used in a bad manner.

Win32.Monitor.2Spy
Win32.Monitor.AutoIT
Win32.Monitor.Jiluzhe
Win32.Monitor.KbrdHook
Win32.Monitor.KeyboardColl
Win32.Monitor.MinkMon
Win32.Monitor.OkoSzefa
Win32.Monitor.SupremeSpy
Win32.Monitor.Szpieg
Win32.Monitor.VB
Win32.Monitor.WinGod

PASSWORD STEALERS

Password stealers can steal user passwords on an infected system, compromising system
security and user privacy.

Win32.TrojanPWS.Daricin
Win32.TrojanPWS.Kecar
Win32.TrojanPWS.Kukuraz
Win32.TrojanPWS.Lox
Win32.TrojanPWS.Psyk
Win32.TrojanPWS.Quner
Win32.TrojanPWS.SuperMario
Win32.TrojanPWS.Zensor
Win32.TrojanPWS.ZombSmallTrojan
VBS.TrojanPWS.aCookies
MSIL.TrojanPWS.Steam

ROUGE ANTI-SPYWARE APPLICATIONS

Rogue anti-spyware applications may give exaggerated threat reports on the compromised computer, and then ask the user to purchase a registered version to remove those reported threats.

Win32.FraudTool.AntivirusIS
Win32.FraudTool.AntivirusMate
Win32.FraudTool.AntivirusStudio
Win32.FraudTool.AVDefender2011
Win32.FraudTool.DiskCleanup
Win32.FraudTool.GoodbyeSpy
Win32.FraudTool.IronDefence
Win32.FraudTool.IronDefender
Win32.FraudTool.LiveSecuritySuite
Win32.FraudTool.MehrdadAV
Win32.FraudTool.MyClean
Win32.FraudTool.MyDefence
Win32.FraudTool.MyPCBoan
Win32.FraudTool.NavaShield
Win32.FraudTool.OneScan
Win32.FraudTool.PCDefence
Win32.FraudTool.PCTrouble
Win32.FraudTool.PrivacyLock
Win32.FraudTool.ScannRepair
Win32.FraudTool.SecurityKeeper
Win32.FraudTool.SpyKill
Win32.FraudTool.SpywareVanish
Win32.FraudTool.SuperFast
Win32.FraudTool.TotalVaccine
Win32.FraudTool.VirusCure
Win32.FraudTool.WebVaccine

TROJANS

Trojans (also known as Trojan Horses) are programs that appear to do one thing but actually do another. Trojans may also download additional files to the infected system.

Win32.Trojan.Anako
Win32.Trojan.Bober
Win32.Trojan.Direr
Win32.Trojan.Eckut
Win32.Trojan.Gabba
Win32.Trojan.Gnom
Win32.Trojan.Iroffer
Win32.Trojan.Lilak
Win32.Trojan.Masul
Win32.Trojan.Myps
Win32.Trojan.PhisingCreator
Win32.Trojan.Qqad
Win32.Trojan.Rina
Win32.Trojan.SpyEyes
Win32.Trojan.Stapa
Win32.Trojan.Suslik
Win32.Trojan.Tired
Win32.Trojan.Totentas
Win32.Trojan.Wisp
BAT.Trojan.Autorun
BAT.Trojan.CopyBAT
BAT.Trojan.Favadd
BAT.Trojan.FormatCQU
BAT.Trojan.FormatD
BAT.Trojan.Formatter
BAT.Trojan.Hdk13
BAT.Trojan.KillProc
BAT.Trojan.Tupnyak
BAT.Trojan.Vitco
MSIL.Trojan.FraudPack
MSIL.Trojan.Inject
MSIL.Trojan.Purswapper
DOS.Trojan.Makerd
DOS.Trojan.Qhost
DOS.Trojan.Shadow98
JS.Trojan.Runner
VBS.Trojan.Rots

TROJANDROPPERS

Trojan.Droppers will drop additional files on the infected system. These files are often other trojans or downloaders.

Win32.TrojanDropper.Ctulhu
Win32.TrojanDropper.ExeTemp
Win32.TrojanDropper.KernDrop
Win32.TrojanDropper.Klop
Win32.TrojanDropper.Zyon

TROJANPROXIES

Trojan.Proxies may open up the infected machine to be used as a proxy server.

Win32.TrojanProxy.Tigen

TROJANSPIES

Trojan.Spy is a type of malicious program that can steal information such as passwords, surfing habits, credit card details and email addresses.

Win32.TrojanSpy.Adroder
Win32.TrojanSpy.iBank
Win32.TrojanSpy.Seedong
Win32.TrojanSpy.Stiw
MSIL.Worm.Reflesh
MSIL.Worm.Volosat
VBS.EmailWorm.Desin
VBS.EmailWorm.Gedza
VBS.EmailWorm.Peach
BAT.EmailWorm.Migrate

WORMS

Worms are network malware, primarily replicating on networks. Usually, a worm will execute itself automatically on a remote machine without any extra help from a user. However, there are worms, such as mass-mailer worms, that will not always automatically execute themselves without the help of a user.

Win32.Worm.Allesgreh
Win32.Worm.AutoTsifiri
Win32.Worm.Exploiter
Win32.Worm.Shadnake
Win32.Worm.VBMania
Win32.EmailWorm.Josam
Win32.IMWorm.Vkontakt
Win32.IMWorm.Xark
Win32.IMWorm.Zeroll

MISCELLANEOUS MALWARE

This grouping contains other programs with malicious intentions.

JS.TrojanDropper.Agent
MSAccess.TrojanDropper.Agent
MSIL.P2PWorm.ShareWire
VBS.TrojanDownloader.Fraudload
VBS.TrojanRansom.FlyKiss
Win32.BadJoke.Bear
Win32.BadJoke.BlackScreen
Win32.BadJoke.InvertMouse
Win32.BadJoke.Streik
Win32.Exploit.CVE-2010-2883
Win32.Exploit.TermServices
Win32.Hoax.FakeDestruct
Win32.Rootkit.Junk
Win32.Rootkit.Qhost
Win32.Toolbar.BabelFish
Win32.Toolbar.Dsearch
Win32.Toolbar.FLVDirect
Win32.Toolbar.Garbage
Win32.Toolbar.RK
Win32.Toolbar.VB