Protect your privacy with new targets for August 2008 (0101.0000-0110.0000)

by Albin on August 8th, 2008 in Definition File Updates.

Newly created families for July (0101.0000-0110.0000)

ADWARE

Adware is a type of advertising display software that delivers advertising content potentially in a manner or context that may be unexpected and unwanted by users. Many adware applications also perform tracking functions, and therefore may also be categorized as tracking technologies. Some consumers may want to remove adware if they object to such tracking, do not wish to see the advertising caused by the program, or are frustrated by its effects on system performance.

Adware.BlogChina
Adware.BMCentral
Adware.EShoper
Adware.GooochBiz
Adware.Hengbang
Adware.IESuper
Adware.MySideSearch
Adware.RK
Adware.Sidebar
Adware.Sogou

BACKDOORS

Backdoors may open up ports on the compromised computer, allowing remote access and control of the victim's machine.

Win32.Backdoor.Alphabot
Win32.Backdoor.Bot
Win32.Backdoor.Deplotoz
Win32.Backdoor.DragonBot
Win32.Backdoor.Hamweq
Win32.Backdoor.Hatchet
Win32.Backdoor.IRC.Koniec
Win32.Backdoor.IRC.Small
Win32.Backdoor.Lamebot
Win32.Backdoor.Linux.PHP
Win32.Backdoor.RemoteStorm
Win32.Backdoor.Rirc
Win32.Backdoor.Rsocks
Win32.Backdoor.Sbot
Win32.Backdoor.Seed
Win32.Backdoor.Swz
Win32.Backdoor.Valvoline
Win32.Backdoor.Virtumonde

DIALERS

Dialers are programs that utilize a computer's modem to make calls or access services. Users may want to remove dialers that dial without the user's active involvement, resulting in unexpected telephone charges and/or cause access to unintended and unwanted content.

Win32.Dialer.Star

DOWNLOADERS

Downloaders are programs designed to retrieve and install additional files. Downloaders can be usefultools for consumers to automate upgrades of essential software such as operating system upgrades, browsers,anti-virus applications, anti-spyware tools, games and other useful applications. Unauthorized downloaders are used by third parties to download potentially unwanted software without user notification or consent.

Win32.TrojanDownloader.CallSolutions
Win32.TrojanDownloader.Cn911
Win32.TrojanDownloader.Drv32
Win32.TrojanDownloader.FakeAntis
Win32.TrojanDownloader.JJWU
Win32.TrojanDownloader.Lamdez
Win32.TrojanDownloader.Obitel
Win32.TrojanDownloader.PromoCarto
Win32.TrojanDownloader.Shoter
Win32.TrojanDownloader.Tipkit
Win32.TrojanDownloader.Veritas
Win32.TrojanDownloader.WMA.GetCodec
Win32.TrojanDownloader.XorCalc
Win32.TrojanDownloader.Zdesnado
Win32.TrojanDownloaderSwf.Agent

FLOODERS

Flooders may provide functionality that makes it possible for an attacker to send massive amounts of data to a specific target. The flooding of a target may, for example, disturb communication services or make various systems unresponsive. This is similar to a DDoS attack where massive amounts of calls are launched against a system. A DDos attack may even make large systems unresponsive if the attack is launched from several computer systems that are infected by a DDoS capable Trojan Horse.

Win32.Flooder.Nassi
Win32.Flooder.Webhat

PASSWORD STEALERS

Password stealers can steal user passwords on an infected system, compromising system security and user privacy.

Win32.Trojan-PWS.BlackCode
Win32.Trojan-PWS.IRC
Win32.Trojan-PWS.Maha
Win32.Trojan-PWS.Qover
Win32.TrojanPWS.QuickBatch

ROUGE ANTI-SPYWARE APPLICATIONS

Rogue anti-spyware applications may give exaggerated threat reports on the compromised computer, and then ask the user to purchase a registered version to remove those reported threats.

Antispyware 2008
Antispyware 2008 XP
Antivirus Master
Antivirus2008pro
PowerAntiVirus2009
PyroAntiSpy
Win Antivirus 2008
WinAntispyware2008
WinAntiVir
VirusRemover2008

TROJANS

Trojans (also known as Trojan Horses) are programs that appear to do one thing but actually do another. Trojans may also download additional files to the infected system.

Win32.Trojan.Atraps
Win32.Trojan.Delflob
Win32.Trojan.FirewallBypass
Win32.Trojan.Fotomoto
Win32.Trojan.IEHomeChan
Win32.Trojan.InMorph
Win32.Trojan.Mario
Win32.Trojan.Moniker
Win32.Trojan.Multis
Win32.Trojan.Muwid
Win32.Trojan.Pandex
Win32.Trojan.Pechkin
Win32.Trojan.PWS.IMPassGrab
Win32.Trojan.PWS.PassViewer
Win32.Trojan.Vxgame

TROJAN.DROPPERS

Trojan.Droppers will drop additional files on the infected system. These files are often other Trojans or downloaders.

Win32.Trojan-Dropper.Aholic
Win32.TrojanDropper.Auto
Win32.Trojan-Dropper.Banker
Win32.Trojan-Dropper.Binder
Win32.TrojanDropper.BindFile
Win32.Trojan-Dropper.Crypter
Win32.Trojan-Dropper.FJoiner
Win32.Trojan-Dropper.Poisoner
Win32.Trojan-Dropper.RQK
Win32.Trojan-Dropper.RSA
Win32.Trojan-Dropper.Srizbi
Win32.Trojan-Dropper.Tibsis

TROJAN.NOTIFIERS

Trojan.Notifiers are Trojans for the Microsoft Windows platform. This Trojan installs to run at system startup, opening ports on the infected system and increasing system vulnerability. Trojan.Notifiers may thereby compromise system security and user privacy.

Win32.TrojanNotifier.Sysbopt

TROJAN.PROXIES

Trojan.Proxies may open up the infected machine to be used as a proxy server.

Win32.TrojanProxy.FlatSurfer
Win32.TrojanProxy.Posta
Win32.TrojanProxy.Procin

TROJAN.SPIES

Trojan.Spies are a type of malicious program that can steal information such as passwords, surfing habits, credit card details and e-mail addresses.

Win32.TrojanSpy.Lorex
Win32.TrojanSpy.SpyEx

VIRUSES

Viruses are code that recursively replicate a possibly evolved copy of itself. Viruses infect a Host File or system area, or they simply modify a reference to such objects to take control and then multiply again to form new generations.

Win32.Virus.Mumawow

WORMS

Worms are network malware, primarily replicating on networks. Usually, a worm will execute itself automatically on a remote machine without any extra help from a user. However, there are worms, such as mass-mailer worms, that will not always automatically execute themselves without the help of a user.

Win32.P2PWorm.Kersex
Win32.Worm.AC
Win32.Worm.Aidid
Win32.Worm.Autoruner
Win32.Worm.DicPP
Win32.Worm.GetCodec
Win32.Worm.Kolabc
Win32.Worm.Koobface
Win32.Worm.Krepper
Win32.Worm.Maplas
Win32.Worm.Mnim
Win32.Worm.PornRun
Win32.Worm.Premier
Win32.Worm.Rahak
Win32.Worm.Randin
Win32.Worm.Relayer
Win32.Worm.Relic
Win32.Worm.Repar
Win32.Worm.Resdoc
Win32.Worm.Robobot
Win32.Worm.Scorvan
Win32.Worm.Seben
Win32.Worm.Seesix
Win32.Worm.Sholta
Win32.Worm.Sluter
Win32.Worm.Soriw
Win32.Worm.Spybot
Win32.Worm.Stefan
Win32.Worm.Sysdil
Win32.Worm.Toguivi
Win32.Worm.Tonica
Win32.Worm.Torun
Win32.Worm.Tulu
Win32.Worm.Unixon
Win32.Worm.Warpigs
Win32.Worm.Wenper
Win32.Worm.Wilab
Win32.Worm.Wormic
Win32.Worm.Zaurga
Win32.Worm.Zindos

MISCELLANEOUS MALWARE

This grouping contains other programs with malicious intentions.

Win32.Rootkit.Podnuha
Win32.SpamTool.IRCBot
Win32.TrojanMailfinder.Mailbot

No votes yet

x

Our best antivirus yet!

Fresh new look. Faster scanning. Better protection.

Enjoy unique new features, lightning fast scans and a simple yet beautiful new look in our best antivirus yet!

For a quicker, lighter and more secure experience, download the all new adaware antivirus 12 now!

Download adaware antivirus 12
No thanks, continue to lavasoft.com
close x

Discover the new adaware antivirus 12

Our best antivirus yet

Download Now