Protect your privacy with new targets for June 2011

by Andy on June 29th, 2011 in Definition File Updates.

BACKDOORS
Backdoors may open up ports on the compromised computer, allowing remote access and control of the victim's machine.

Win32.Backdoor.Darkhole
Win32.Backdoor.Loger
Win32.Backdoor.Spectrum
Win32.Backdoor.Sub7x
Win32.Backdoor.Telner
Win32.Backdoor.Xtob
   

DOWNLOADERS
Downloaders are programs designed to retrieve and install additional files. Downloaders can be useful tools for consumers to automate upgrades of essential software such as operating system upgrades, browsers, anti-virus applications, anti-spyware tools, games and other useful applications. Unauthorized downloaders are used by third parties to download potentially unwanted software without user notification or consent.

Win32.TrojanDownloader.Amateur
Win32.TrojanDownloader.Boaxxe
Win32.TrojanDownloader.Choaser
Win32.TrojanDownloader.Dlkrot
Win32.TrojanDownloader.Fakescreen
Win32.TrojanDownloader.Necurs

FLOODERS
Flooders may provide functionality that makes it possible for an attacker to send massive amount of data to a specific target. The flooding of a target may for an example disturb communication services or make various systems unresponsive. This is similar to a DDoS attack where a massive amounts of calls are launched against a system. A DDos attack may even make large systems unresponsive if the attack is launched from several computer systems that are infected by a DDoS capable Trojan Horse.

Win32.Flooder.Flash3   


PASSWORD STEALERS
Password stealers can steal user passwords on an infected system, compromising system security and user privacy.

Win32.TrojanPWS.Codec
Win32.TrojanPWS.Msner
Win32.TrojanPWS.Widget-based


ROGUE ANTI-SPYWARE APPLICATIONS
Rogue anti-spyware applications may give exaggerated threat reports on the compromised computer, and then ask the user to purchase a registered version to remove those reported threats.

Win32.FraudTool.SecurityDefender
Win32.FraudTool.WindowsAcceleratingUtility
Win32.FraudTool.WindowsAccidentsPrevention
Win32.FraudTool.WindowsAnticrashesUtility
Win32.FraudTool.WindowsAvertingSystem
Win32.FraudTool.WindowsCrashesDeliverer
Win32.FraudTool.WindowsCustomSettings
Win32.FraudTool.WindowsExaminationUtility
Win32.FraudTool.WindowsFirewallUnit
Win32.FraudTool.WindowsMonitoringUtility
Win32.FraudTool.WindowsProtectionAlarm
Win32.FraudTool.WindowsRescueCenter
Win32.FraudTool.WindowsRisksPreventions
Win32.FraudTool.WindowsSaviourFirewall
Win32.FraudTool.WindowsStabilityAlarm
Win32.FraudTool.WindowsTroublesKiller
Win32.FraudTool.WindowsTroublesSolver
Win32.FraudTool.WindowsVerifyingCenter
Win32.FraudTool.WindowsWorkChecker
Win32.FraudTool.XPInternetSecurity2012


TROJANS
Trojans (also known as Trojan Horses) are programs that appear to do one thing but actually do another. Trojans may also download additional files to the infected system.

Win32.Trojan.Arto
Win32.Trojan.Cakh
Win32.Trojan.Cidox
Win32.Trojan.Keenval
Win32.Trojan.Laeng
Win32.Trojan.Lampa
Win32.Trojan.Smartpepi
Win32.Trojan.Vbter
Win32.Trojan.Yakes
Win32.TrojanRansom.Kargapo
Win32.TrojanRansom.Mbro


TROJANDDOS
TrojanDDoS applicaitons provides functionality that makes it possible for an attacker to send massive amount of data to a specific target. The flooding of a target may for an example disturb communication services or make various systems unresponsive.

Win32.TrojanDDoS.Kker


TROJANDROPPERS
Trojan.Droppers will drop additional files on the infected system. These files are often other trojans or downloaders.

Win32.TrojanDropper.Gen
Win32.TrojanDropper.Hozan
Win32.TrojanDropper.Injector
Win32.TrojanDropper.Sevsx   


TROJANPROXIES
Trojan.Proxies may open up the infected machine to be used as a proxy server.   

Win32.TrojanProxy.Rests


TROJANSPIES
Trojan.Spy is a type of malicious program that can steal information such as passwords, surfing habits, credit card details and email addresses.

Win32.TrojanSpy.Bitwallet
Win32.TrojanSpy.Snifie


WORMS
Worms are network malware, primarily replicating on networks. Usually, a worm will execute itself automatically on a remote machine without any extra help from a user. However, there are worms, such as mass-mailer worms, that will not always automatically execute themselves without the help of a user.

Win32.P2PWorm.Autoit
Win32.P2PWorm.Gotorm
Win32.Worm.Beeswarm
Win32.Worm.Cynic
Win32.Worm.Fakefolder
Win32.Worm.Fbook
Win32.Worm.Rorpian


MISCELLANEOUS
This grouping contains other programs.

Finderquery
PlayPickle
Win32.Hoax.Fakeav
Win32.Hoax.Fraudrop
Win32.Hoax.Mdefender
Win32.Hoax.Reupd
Win32.Hoax.Securityshield
Win32.Rootkit.Necurs
Win32.Rootkit.Pmax
Win64.Rootkit.Banker

No votes yet

x

Our best antivirus yet!

Fresh new look. Faster scanning. Better protection.

Enjoy unique new features, lightning fast scans and a simple yet beautiful new look in our best antivirus yet!

For a quicker, lighter and more secure experience, download the all new adaware antivirus 12 now!

Download adaware antivirus 12
No thanks, continue to lavasoft.com
close x

Discover the new adaware antivirus 12

Our best antivirus yet

Download Now