Protect your privacy with new targets for December 2008 (0139.0000-0143.0005)
Protect your privacy with new targets for December 2008 (0139.0000-0143.0005)
Newly created families for December (0139.0000-0143.0005)
ADWARE
Adware is a type of advertising display software that delivers advertising content potentially in a manner orcontext that may be unexpected and unwanted by users. Many adware applications also perform tracking functions,and therefore may also be categorized as tracking technologies. Some consumers may want to remove adware if they object to such tracking, do not wish to see the advertising caused by the program, or are frustrated by its effects on system performance.
AdPurgeSpywareRemover
Adware.AdServer
Adware.Craagle
Adware.Goldrun
Adware.Samoware
Adware.Smartpops
Adware.Thingies
BACKDOORS
Backdoors may open up ports on the compromised computer, allowing remote access and control of the victim's machine.
Win32.Backdoor.Atlantis
Win32.Backdoor.DSSdoor
Win32.Backdoor.Flyagent
Win32.Backdoor.Haxpa
Win32.Backdoor.HIDDoor
Win32.Backdoor.LiteBot
Win32.Backdoor.Momibot
Win32.Backdoor.MTBot
Win32.Backdoor.Pigbot
Win32.Backdoor.SLH
Win32.Backdoor.Tompai
DOWNLOADERS
Downloaders are programs designed to retrieve and install additional files. Downloaders can be useful tools for consumers to automate upgrades of essential software such as operating system upgrades, browsers, anti-virus applications, anti-spyware tools, games and other useful applications. Unauthorized downloaders are used by third parties to download potentially unwanted software without user notification or consent.
Win32.TrojanDownloader.ACVE
Win32.TrojanDownloader.Bhosta
Win32.TrojanDownloader.ChinaHuan
Win32.TrojanDownloader.Hah
Win32.TrojanDownloader.Konix
Win32.TrojanDownloader.Netcom
Win32.TrojanDownloader.Pipi
Win32.TrojanDownloader.Priv
Win32.TrojanDownloader.Pusto
Win32.TrojanDownloader.Sosad
PASSWORD STEALERS
Password stealers can steal user passwords on an infected system, compromising system security and user privacy.
Win32.TrojanPWS.MailRu
Win32.TrojanPWS.Messen
Win32.TrojanPWS.Ragna
ROUGE ANTI-SPYWARE APPLICATIONS
Rogue anti-spyware applications may give exaggerated threat reports on the compromised computer, and then ask the
user to purchase a registered version to remove those reported threats.
AntivirusSentry
AntivirusTrigger
ErrorRepairTool
ExtraAntivir
NanoAntivirus
PerfectDefender2009
WinWebSecurity
VirusTrigger
XPProtectionCenter
TROJANS
Trojans (also known as Trojan Horses) are programs that appear to do one thing but actually do another. Trojans may also download additional files to the infected system.
Win32.Trojan.Bepiv
Win32.Trojan.BHOLamp
Win32.Trojan.BlaBla
Win32.Trojan.Cdur
Win32.Trojan.DieMast
Win32.Trojan.Firehole
Win32.Trojan.MMM
Win32.Trojan.Proscks
Win32.Trojan.Pulez
Win32.Trojan.Sameno
Win32.Trojan.Webcracker
TROJANDDoS
TrojanDDoS applicaitons provides functionality that makes it possible for an attacker to send massive amount of data to a specific target. The flooding of a target may for an example disturb communication services or make various systems unresponsive.
Win32.TrojanDDoS.Artlu
Win32.TrojanDDoS.SITC
TROJAN.DROPPERS
Trojan.Droppers will drop additional files on the infected system. These files are often other Trojans or downloaders.
Win32.Trojan-Dropper.Binder
Win32.TrojanDropper.CleanView
Win32.TrojanDropper.Fire
Win32.TrojanDropper.Frichi
Win32.TrojanDropper.Gereg
Win32.TrojanDropper.Gusty
Win32.TrojanDropper.Kryptik
Win32.TrojanDropper.Libe
Win32.TrojanDropper.Pich
Win32.TrojanDropper.ScriptDrop
Win32.TrojanDropper.Sopelka
Win32.TrojanDropper.TopBinder
Win32.TrojanDropper.Wawa
Win32.TrojanDropper.Zskiller
TROJAN.SPIES
Trojan.Spies are a type of malicious program that can steal information such as passwords, surfing habits, credit card details and e-mail addresses.
Win32.TrojanSpy.Lupa
Win32.TrojanSpy.Spyrecon
WORMS
Worms are network malware, primarily replicating on networks. Usually, a worm will execute itself automatically on a remote machine without any extra help from a user. However, there are worms, such as mass-mailer worms, that will not always automatically execute themselves without the help of a user.
Win32.Worm.Gingo
Win32.Worm.Pinit
Win32.Worm.Vasor
Win32.P2PWorm.Packes
Win32.P2PWorm.Small
TROJAN.CLICKERS
Trojan.Clickers may cause the victims machine to contact a target webpage without the users knowledge or consent to falsify data about the number of times the webpage is visited.
Win32.TrojanClicker.Inject
Win32.TrojanClicker.Zena
MISCELLANEOUS MALWARE
This grouping contains other programs with malicious intentions.
Win32.DoS.Ras
Win32.EmailFlooder.Kaboom
Win32.Hoax.VB
Win32.Hoax.Webmoner
Win32.Monitor.Winguardian
Win32.TrojanMailfinder.Delf
Win32.TrojanMailfinder.Small
Win32.TrojanRansom.Daideneg