Protect your privacy with new targets for June 2010 (0149.243-0149.286)
Newly created families for June (0149.243-0149.286)
ADWARE
Adware is a type of advertising display software that delivers advertising content potentially in a manner or context that may be unexpected and unwanted by users.
Many adware applications also perform tracking functions, and therefore may also be categorized as tracking technologies. Some consumers may want to remove adware if they object to such tracking, do not wish to see the advertising caused by the program, or are frustrated by its effects on system performance.
Win32.Adware.AdPromo
Win32.Adware.Background
Win32.Adware.Bekser
Win32.Adware.Broadcap
Win32.Adware.Jinzie
Win32.Adware.MetaSearch
Win32.Adware.Pugi
Win32.Adware.SBSoft
Win32.Adware.Searchcolor
Win32.Adware.ShopAtHome
BACKDOORS
Backdoors may open up ports on the compromised computer,
allowing remote access and control of the victim's machine.
Win32.Backdoor.Errno
Win32.Backdoor.FTPSolitaire
Win32.Backdoor.Gootkit
Win32.Backdoor.Qvod
Win32.Backdoor.RA-based
Win32.Backdoor.Trup
DOWNLOADERS
Downloaders are programs designed to retrieve and install additional files. Downloaders can be useful tools for consumers to automate upgrades of essential
software such as operating system upgrades, browsers, anti-virus applications, anti-spyware tools, games and other useful applications. Unauthorized downloaders are used by third parties to download potentially unwanted software without user notification or consent.
Win32.TrojanDownloader.Digitalnames
Win32.TrojanDownloader.HttpDown
Win32.TrojanDownloader.Lagolod
Win32.TrojanDownloader.Onet
Win32.TrojanDownloader.Phrovon
Win32.TrojanDownloader.Sava
MONITORS
Monitors are surveillance tools that for example monitors users keystrokes and it therefore may compromise user privacy if it is used in a bad manner.
Win32.Monitor.ABCKeyLog
Win32.Monitor.Agent
Win32.Monitor.AKL
Win32.Monitor.Borzoi
Win32.Monitor.BossEveryware
Win32.Monitor.Desktake
Win32.Monitor.DesktopSpy
Win32.Monitor.DSPY
Win32.Monitor.HiddenRecorder
Win32.Monitor.IMGrabber
Win32.Monitor.KeyboardSpectator
Win32.Monitor.KeySpectrator
Win32.Monitor.MsnChatMonitor
Win32.Monitor.MsnSniffer
Win32.Monitor.Myss
Win32.Monitor.MySuperSpy
Win32.Monitor.PanteraLog
Win32.Monitor.PkrPoker
Win32.Monitor.RemoteDesktopSpy
Win32.Monitor.ScreenMonitor
Win32.Monitor.TiMontor
Win32.Monitor.WinKeyLogger
PASSWORD STEALERS
Password stealers can steal user passwords on an infected system, compromising system security and user privacy.
Win32.TrojanPWS.Biter
Win32.TrojanPWS.VBS-Cookies
Win32.TrojanPWS.Yahupass
ROUGE ANTI-SPYWARE APPLICATIONS
Rogue anti-spyware applications may give exaggerated threat reports on the
compromised computer, and then ask the user to purchase a registered version
to remove those reported threats.
Win32.FraudTool.ByteDefender
Win32.FraudTool.ProtectionCenter
Win32.FraudTool.SecurityMasterAV
Win32.FraudTool.SysinternalsAntivirus
Win32.FraudTool.WinAntispywareCenter
Win32.FraudTool.XJRAntivirus
TROJANS
Trojans (also known as Trojan Horses) are programs that appear to do one thing but actually do another. Trojans may also download additional files to the infected system.
Win32.Trojan.Frauddesc
Win32.Trojan.Ftar
Win32.Trojan.Krs
Win32.Trojan.Madise
Win32.Trojan.Mulwin
Win32.Trojan.Phires
Win32.Trojan.Pirminay
Win32.Trojan.Twebot
TROJAN.CLICKERS
Trojan.Clicker’s may cause the victims machine to contact a target webpage without the users knowledge or consent to falsify data about the number of times the webpage is visited.
Win32.TrojanClicker.Frusefas
TROJANDDOS
TrojanDDoS applicaitons provides functionality that makes it possible for an attacker
to send massive amount of data to a specific target. The flooding of a target may for an example disturb communication services or make various systems unresponsive.
Win32.TrojanDDoS.Chim
TROJANDROPPERS
Trojan.Droppers will drop additional files on the infected system. These files are often other trojans or downloaders.
Win32.TrojanDropper.Dron
Win32.TrojanDropper.Inegery
Win32.TrojanDropper.Rogan
Win32.TrojanDropper.TrashCode
Win32.TrojanDropper.VkHost
TROJANSPIES
Trojan.Spy is a type of malicious program that can steal information such as passwords, surfing habits, credit card details and email addresses.
Win32.TrojanSpy.Newrok
WORMS
Worms are network malware, primarily replicating on networks. Usually, a worm will
execute itself automatically on a remote machine without any extra help from a user. However, there are worms, such as mass-mailer worms, that will not always automatically execute themselves without the help of a user.
MSIL.Worm.Arcdoor
MSIL.Worm.PSW
VBS.EmailWorm.LoveLetter
Win32.Worm.BATNelly
Win32.Worm.Qvod
MISCELLANEOUS MALWARE
This grouping contains other programs with malicious intentions.
MSIL.Trojan.KillAV
MSIL.TrojanDropper.Late
Win32.BadJoke.SwapMouseButton
Win32.Flooder.Dc
Win32.Hoax.ArchSMS
Win32.Rootkit.Bubnix
Win32.Rootkit.Mediyes
Win32.Exploit.CCProxer
Win32.Exploit.IMG-TIF
Win32.Exploit.NukerNonuker
Win32.TrojanRansom.Fakeinstaller
Win32.TrojanRansom.Rector