Protect your privacy with new targets for September 2011

by Andy on September 16th, 2011 in Definition File Updates.

BACKDOORS
Backdoors may open up ports on the compromised computer, allowing remote access and control of the victim's machine.
Win32.Backdoor.Cbot
Win32.Backdoor.Cow


ROGUE ANTI-SPYWARE APPLICATIONS
Rogue anti-spyware applications may give exaggerated threat reports on the compromised computer, and then ask the user to purchase a registered version to remove those reported threats.
Win32.FraudTool.BachKhoa


TROJANS
Trojans (also known as Trojan Horses) are programs that appear to do one thing but actually do another. Trojans may also download additional files to the infected system.
Win32.Trojan.Byxta
Win32.Trojan.Painwin
Win32.Trojan.Rimod
Win32.Trojan.Rumo
Win32.Trojan.Vico


DOWNLOADERS
Downloaders are programs designed to retrieve and install additional files. Downloaders can be useful tools for consumers to automate upgrades of essential software such as operating system upgrades, browsers, anti-virus applications, anti-spyware tools, games and other useful applications. Unauthorized downloaders are used by third parties to download potentially unwanted software without user notification or consent.
Win32.TrojanDownloader.Huc
Win32.TrojanDownloader.Wtw


TROJANSPIES
Trojan.Spy is a type of malicious program that can steal information such as passwords, surfing habits, credit card details and email addresses.
Win32.TrojanSpy.Bc


MISCELLANEOUS
This grouping contains other programs.
Win32.TrojanClicker.Lsatrip
Win32.Hoax.Fakehack
Win32.Rootkit.Mybios
Win32.Rootkit.Zachelp
Win32.Dialer.Arrobaline
Win32.EmailFlooder.Crazymail