Protect your privacy with new targets for July 2010 (0149.287-0149.336)

by Albin on July 22nd, 2010 in Definition File Updates.

Newly created families for July 2010 (0149.287-0149.336)

ADWARE

Adware is a type of advertising display software that delivers advertising content potentially in a manner or context that may be unexpected and unwanted by users.
Many adware applications also perform tracking functions, and therefore may also be categorized as tracking technologies. Some consumers may want to remove adware if they object to such tracking, do not wish to see the advertising caused by the program, or are frustrated by its effects on system performance.

Win32.Adware.AdAnyWhere
Win32.Adware.Azesearch
Win32.Adware.Navi
Win32.Adware.Perez
Win32.Adware.PrimeSoft
Win32.Adware.Puper
Win32.Adware.Specofer
Win32.Adware.Stoys
Win32.Adware.Visiter
Win32.Adware.Webser
Win32.Adware.Winsta

BACKDOORS

Backdoors may open up ports on the compromised computer, allowing remote access and control of the victim's machine.

Win32.Backdoor.Cinkel
Win32.Backdoor.DMSpammer
Win32.Backdoor.FinalTry
Win32.Backdoor.Oserdi
Win32.Backdoor.Ripinip
Win32.Backdoor.Ripnip
Win32.Backdoor.Shiz
Win32.Backdoor.Skill
Win32.Backdoor.SpyAll
Win32.Backdoor.Winsdoor

DIALERS

Any program that utilizes a computer's modem to make calls or access services. Users may want to remove Dialers that dial without the user's active involvement, resulting in unexpected telephone charges and/or cause access to unintended and unwanted content.

Win32.Dialer.HS-Connect
Win32.Dialer.LauraAngel
Win32.Dialer.P2PAg

DOWNLOADERS

Downloaders are programs designed to retrieve and install additional files. Downloaders can be useful tools for consumers to automate upgrades of essential
software such as operating system upgrades, browsers, anti-virus applications, anti-spyware tools, games and other useful applications. Unauthorized downloaders are used by third parties to download potentially unwanted software without user notification or consent.

Win32.TrojanDownloader.Arpepoler
Win32.TrojanDownloader.Duckma
Win32.TrojanDownloader.Nekill
Win32.TrojanDownloader.Todimires

FLOODERS

Flooders may provide functionality that makes it possible for an attacker to send massive amount of data to a specific target. The flooding of a target may for an example disturb communication services or make various systems unresponsive. This is similar to a DDoS attack where a massive amounts of calls are launched against a system. A DDos attack may even make large systems unresponsive if the attack is launched from several computer systems that are infected by a DDoS capable Trojan Horse.   

Win32.Flooder.Yahu

MONITORS

Monitors are surveillance tools that for example monitors users keystrokes and it therefore may compromise user privacy if it is used in a bad manner.

Win32.Monitor.EmailObserver
Win32.Monitor.ExtraSpyEMon
Win32.Monitor.GeShan
Win32.Monitor.KeyKey
Win32.Monitor.MSpy
Win32.Monitor.ScreenSpy

PASSWORD STEALERS

Password stealers can steal user passwords on an infected system, compromising system security and user privacy.

Win32.TrojanPWS.Batfield
Win32.TrojanPWS.Dipwit
Win32.TrojanPWS.Emelent
Win32.TrojanPWS.Kukudva
Win32.TrojanPWS.Locawow

ROUGE ANTI-SPYWARE APPLICATIONS

Rogue anti-spyware applications may give exaggerated threat reports on the
compromised computer, and then ask the user to purchase a registered version
to remove those reported threats.

Win32.FraudTool.AntivirSolutionPro
Win32.FraudTool.AntivirusGT
Win32.FraudTool.AVSecuritySuite
Win32.FraudTool.DefenseCenter

TROJANS

Trojans (also known as Trojan Horses) are programs that appear to do one thing but actually do another. Trojans may also download additional files to the infected system.

Win32.Trojan.Daurso
Win32.Trojan.Gibi
Win32.Trojan.Gofy
Win32.Trojan.JorikArcdoor
Win32.Trojan.JorikBanker
Win32.Trojan.JorikBlakken
Win32.Trojan.JorikBlazebot
Win32.Trojan.JorikBredolab
Win32.Trojan.JorikButerat
Win32.Trojan.JorikClickAds
Win32.Trojan.JorikDMSpammer
Win32.Trojan.JorikDpSevx
Win32.Trojan.JorikFraud
Win32.Trojan.JorikHamweq
Win32.Trojan.JorikImgDrop
Win32.Trojan.JorikIRCbot
Win32.Trojan.JorikKbot
Win32.Trojan.JorikKoobface
Win32.Trojan.JorikLolbot
Win32.Trojan.JorikOficla
Win32.Trojan.JorikPoebot
Win32.Trojan.JorikSdBot
Win32.Trojan.JorikShiz
Win32.Trojan.JorikSpyBot
Win32.Trojan.JorikSpyEyes
Win32.Trojan.JorikTDSS
Win32.Trojan.JorikTedroo
Win32.Trojan.JorikTibs
Win32.Trojan.JorikTierry
Win32.Trojan.JorikZbot
Win32.Trojan.Kltest
Win32.Trojan.Misaut
Win32.Trojan.Muiron
Win32.Trojan.Opeg
Win32.Trojan.Orficla
Win32.Trojan.Pirmidrop
Win32.Trojan.Poper
Win32.Trojan.RCSync
Win32.Trojan.Sefnit
Win32.Trojan.Sintan
Win32.Trojan.Techel
Win32.Trojan.Tengib
Win32.Trojan.Tirnod
Win32.Trojan.Workir

TROJAN.CLICKERS

Trojan.Clicker’s may cause the victims machine to contact a target webpage without the users knowledge or consent to falsify data about the number of times the webpage is visited.

Win32.TrojanClicker.JSLinker
Win32.TrojanClicker.SWFSmall

TROJANDROPPERS

Trojan.Droppers will drop additional files on the infected system. These files are often other trojans or downloaders.

Win32.TrojanDropper.Appis
Win32.TrojanDropper.BindWeb
Win32.TrojanDropper.Chyup
Win32.TrojanDropper.Raser
Win32.TrojanDropper.StuxNet

TROJANSPIES

Trojan.Spy is a type of malicious program that can steal information such as passwords, surfing habits, credit card details and email addresses.

Win32.TrojanSpy.Apotriphis
Win32.TrojanSpy.Brospa
Win32.TrojanSpy.Laproy
Win32.TrojanSpy.Nelep
Win32.TrojanSpy.Plankton

WORMS

Worms are network malware, primarily replicating on networks. Usually, a worm will
execute itself automatically on a remote machine without any extra help from a user. However, there are worms, such as mass-mailer worms, that will not always automatically execute themselves without the help of a user.

Win32.Worm.Rayon
Win32.Worm.USCoge
Win32.Worm.Zipdoc
Win32.WormYosheetsune

MISCELLANEOUS MALWARE

This grouping contains other programs with malicious intentions.

JS.Exploit.Agent
JS.Exploit.Pdfka
JS.Trojan.Agent
JS.Trojan.IFrame
JS.Trojan.Seeker
JS.TrojanClicker.Agent
JS.TrojanDownloader.Agent
MSIL.Backdoor.Vkont
MSIL.TrojanSpy.Zbot
MSIL.Worm.Autorun
MSIL.Worm.BorrarBoot
MSIL.Worm.NsMes
SWF.Exploit.CVE-2010-1297
VBS.Worm.Autorun
Win32.BadJoke.BeepingMouse
Win32.BadJoke.Finger
Win32.BadJoke.Solitair
Win32.Exploit.NukerModescape
Win32.Exploit.SWFAgent
Win32.Hoax.Ruwmz
Win32.Rootkit.StuxNet
Win32.TrojanRansom.Winac

No votes yet

x

Our best antivirus yet!

Fresh new look. Faster scanning. Better protection.

Enjoy unique new features, lightning fast scans and a simple yet beautiful new look in our best antivirus yet!

For a quicker, lighter and more secure experience, download the all new adaware antivirus 12 now!

Download adaware antivirus 12
No thanks, continue to lavasoft.com
close x

Discover the new adaware antivirus 12

Our best antivirus yet

Download Now