Protect your privacy with new targets for August 2011
BACKDOORS
Backdoors may open up ports on the compromised computer, allowing remote access and control of the victim's machine.
Win32.Backdoor.Bjeep
Win32.Backdoor.Proxyier
Win64.Backdoor.Geckaseka
ROGUE ANTI-SPYWARE APPLICATIONS
Rogue anti-spyware applications may give exaggerated threat reports on the compromised computer, and then ask the user to purchase a registered version to remove those reported threats.
Win32.FraudTool.BlueflareAntivirus
TROJANS
Trojans (also known as Trojan Horses) are programs that appear to do one thing but actually do another. Trojans may also download additional files to the infected system.
Win32.Trojan.Besut
Win32.Trojan.Fakeime
Win32.Trojan.Kower
Win32.Trojan.Miner
Win32.Trojan.Munga
Win32.TrojanRansom.Cidox
TROJANDROPPERS
Trojan.Droppers will drop additional files on the infected system. These files are often other trojans or downloaders.
Win32.TrojanDropper.Miner
Win32.TrojanDropper.Pihar
TROJANSPIES
Trojan.Spy is a type of malicious program that can steal information such as passwords, surfing habits, credit card details and email addresses.
Win32.TrojanSpy.Dnswatcher
Win32.TrojanSpy.Lurk
Win32.TrojanSpy.Taopap
WORMS
Worms are network malware, primarily replicating on networks. Usually, a worm will execute itself automatically on a remote machine without any extra help from a user. However, there are worms, such as mass-mailer worms, that will not always automatically execute themselves without the help of a user.
Win32.Worm.Juched
MISCELLANEOUS
This grouping contains other programs
Win32.Dialer.Webpass
Win32.Hoax.Belin