Protect your privacy with new targets for October 2008 (0122.0000-0131.0000)

by Albin on October 17th, 2008 in Definition File Updates.

Newly created families for October (0122.0000-0131.0000)

ADWARE

Adware is a type of advertising display software that delivers advertising content potentially in a manner or context that may be unexpected and unwanted by users. Many adware applications also perform tracking functions, and therefore may also be categorized as tracking technologies. Some consumers may want to remove adware if they object to such tracking, do not wish to see the advertising caused by the program, or are frustrated by its effects on system performance.

Adware.Adtomi
Adware.CaptainCode
Adware.InstallDollar
Adware.OnWebMedia
Adware.PopUpDefence
Adware.SearchScope

BACKDOORS

Backdoors may open up ports on the compromised computer, allowing remote access and control of the victim's machine.

Win32.Backdoor.ceBot
Win32.Backdoor.Celofot
Win32.Backdoor.CEP
Win32.Backdoor.CWZ
Win32.Backdoor.Ezpatch
Win32.Backdoor.Gendal
Win32.Backdoor.GirlInRed
Win32.Backdoor.HttpBot
Win32.Backdoor.ISpyProf
Win32.Backdoor.Privaz
Win32.Backdoor.StealthEye
Win32.Backdoor.Subus
Win32.Backdoor.TDSS
Win32.Backdoor.Ton
Win32.Backdoor.Wabot
Win32.Backdoor.Vagr

DIALERS

Dialers are programs that utilize a computer's modem to make calls or access services. Users may want to remove dialers that dial without the user's active involvement, resulting in unexpected telephone charges and/or cause access to unintended and unwanted content.

Win32.Dialer.ALifeDialer
Win32.Dialer.Cyberbill
Win32.Dialer.Juicy
Win32.Dialer.Loneliness

DOWNLOADERS

Downloaders are programs designed to retrieve and install additional files. Downloaders can be useful tools for consumers to automate upgrades of essential software such as operating system upgrades, browsers, anti-virus applications,anti spyware tools, games and other useful applications. Unauthorized downloaders are used by third parties to download potentially unwanted software without user notification or consent.

Win32.TrojanDownloader.Braidupdate
Win32.TrojanDownloader.Cardsys
Win32.TrojanDownloader.Doldow
Win32.TrojanDownloader.Hoaxer
Win32.TrojanDownloader.Htool
Win32.TrojanDownloader.Humor
Win32.TrojanDownloader.Koone
Win32.TrojanDownloader.Kwaad
Win32.TrojanDownloader.Malwar
Win32.TrojanDownloader.Osel
Win32.TrojanDownloader.Pakes
Win32.TrojanDownloader.Puper
Win32.TrojanDownloader.RtkDL
Win32.TrojanDownloader.TibSystems
Win32.TrojanDownloader.Turk

FLOODERS

Flooders may provide functionality that makes it possible for an attacker to send massive amounts of data to a specific target. The flooding of a target may, for example, disturb communication services or make various systems unresponsive.
This is similar to a DDoS attack where massive amounts of calls are launched against a system. A DDos attack may even make large systems unresponsive if the attack is launched from several computer systems that are infected by a DDoS capable Trojan Horse.

Win32.IMFlooder.Imtale

MONITORS

Monitors are surveillance tools that for example monitors users keystrokes and it therefore may compromise user privacy if it is used in a bad manner.

Win32.Monitor.GoldenEye
Win32.Monitor.IKL
Win32.Monitor.KeyLogger
Win32.Monitor.Kidlogger
Win32.Monitor.MessengerLog
Win32.Monitor.MetaCodix
Win32.Monitor.MiniKeyLog
Win32.Monitor.OverSpy
Win32.Monitor.PaqKeyLog
Win32.Monitor.PCPandora
Win32.Monitor.PCRecord
Win32.Monitor.PCSpy
Win32.Monitor.PerfectKeylogger
Win32.Monitor.Perflogger
Win32.Monitor.QuickKeyLogger
Win32.Monitor.RefogKeylogger
Win32.Monitor.RevealerKeylogger
Win32.Monitor.SpyAgent
Win32.Monitor.Spylo
Win32.Monitor.SpyMyPC
Win32.Monitor.Star
Win32.Monitor.TimsKeylogger
Win32.Monitor.TotalSpy
Win32.Monitor.TypeTeller
Win32.Monitor.Watching
Win32.Monitor.Winvestigator
Win32.Monitor.XPCSpy

PASSWORD STEALERS

Password stealers can steal user passwords on an infected system, compromising system security and user privacy.

Win32.TrojanPWS.Dionizos
Win32.TrojanPWS.FirePass
Win32.TrojanPWS.MultiFirst
Win32.TrojanPWS.Passdev
Win32.TrojanPWS.QQSender
Win32.TrojanPWS.Redneck
Win32.TrojanPWS.SocNet
Win32.TrojanPWS.Soulwork
Win32.TrojanPWS.Tupai
Win32.TrojanPWS.Zulu

ROUGE ANTI-SPYWARE APPLICATIONS

Rogue anti-spyware applications may give exaggerated threat reports on the compromised computer, and then ask the user to purchase a registered version to remove those reported threats.

AntiMalware2009
AntiMalwarePRO
Antivirus2010
eAntivirusPro
PersonalAntiSpy
SpywareGuard2008
VirusResponseLab2009
XPAntispyware2009
UltimateSpyKiller

TROJANS

Trojans (also known as Trojan Horses) are programs that appear to do one thing but actually do another. Trojans may also download additional files to the infected system.

in32.Trojan.Alureon
Win32.Trojan.Botget
Win32.Trojan.Chinaad
Win32.Trojan.DialTelSender
Win32.Trojan.FakeAV
Win32.Trojan.FakeTask
Win32.Trojan.FWdisable
Win32.Trojan.Gamona
Win32.Trojan.Horse
Win32.Trojan.Jevafus
Win32.Trojan.Jumin
Win32.Trojan.LiuMazi
Win32.Trojan.Microfake
Win32.Trojan.MSNSpammer
Win32.Trojan.Oliga
Win32.Trojan.Popuper
Win32.Trojan.Regdis
Win32.Trojan.SFBdld
Win32.Trojan.Smalldrp
Win32.Trojan.Smallgame
Win32.Trojan.Subster
Win32.Trojan.TDss
Win32.Trojan.Unpacked
Win32.Trojan.Virtool
Win32.Trojan.Voter

TROJANDDoS

TrojanDDoS applicaitons provides functionality that makes it possible for an attacker to send massive amount of data to a specific target. The flooding of a target may for an example disturb communication services or make various systems unresponsive.

Win32.TrojanDDoS.Fram

TROJAN.DROPPERS

Trojan.Droppers will drop additional files on the infected system.
These files are often other Trojans or downloaders.

Win32.Trojan-Dropper.Accoona
Win32.Trojan-Dropper.Basinth
Win32.Trojan-Dropper.BitDload
Win32.Trojan-Dropper.Chqq
Win32.Trojan-Dropper.Danseed
Win32.TrojanDropper.Del
Win32.TrojanDropper.Hirhir
Win32.TrojanDropper.Multidropper
Win32.Trojan-Dropper.Rootkit

TROJAN.PROXIES

Trojan.Proxies may open up the infected machine to be used as a proxy server.

Win32.TrojanProxy.Parlay

TROJAN.SPIES

Trojan.Spies are a type of malicious program that can steal information such as passwords, surfing habits, credit card details and e-mail addresses.

Win32.TrojanSpy.Ftput
Win32.TrojanSpy.Lydra
Win32.TrojanSpy.Spav
Win32.TrojanSpy.VBChuchelo
Win32.TrojanSpy.Wsnpoem

WORMS

Worms are network malware, primarily replicating on networks. Usually, a worm will execute itself automatically on a remote machine without any extra help from a user. However, there are worms, such as mass-mailer worms, that will not always automatically execute themselves without the help of a user.

Win32.Worm.Cayen
Win32.Worm.Druzgl
Win32.Worm.Gavir
Win32.Worm.Kullan
Win32.Worm.Lydra
Win32.Worm.Monikey
Win32.Worm.Nuj
Win32.Worm.PassView
Win32.Worm.PTPbot
Win32.Worm.Qucan
Win32.Worm.Ridnu
Win32.Worm.Slenfbot
Win32.Worm.Systroj
Win32.Worm.Zbot
Win32.P2PWorm.Apsiv
Win32.P2PWorm.Furby
Solaris.Worm.Sadmind

MISCELLANEOUS MALWARE

This grouping contains other programs with malicious intentions.

SymbOS.Trojan.Dampig
SymbOS.Trojan.RomWar
SymbOS.Worm.Beselo
SymbOS.Worm.Cabir
SymbOS.Worm.Comwar
SymbOS.Worm.Lasco
Win32.Exploit.Pidief
Win32.FraudTool.Sentinel
Win32.Hoax.0cent
Win32.Hoax.Krepper
Win32.Hoax.Prdelky
Win32.Hoax.SysCare
Win32.IRCWorm.Delf
Win32.Rootkit.Fuzen
Win32.Rootkit.Protector
Win32.TrojanRansom.Hexzone
Win32.TrojanRansom.Skomaz

No votes yet

x

Our best antivirus yet!

Fresh new look. Faster scanning. Better protection.

Enjoy unique new features, lightning fast scans and a simple yet beautiful new look in our best antivirus yet!

For a quicker, lighter and more secure experience, download the all new adaware antivirus 12 now!

Download adaware antivirus 12
No thanks, continue to lavasoft.com
close x

Discover the new adaware antivirus 12

Our best antivirus yet

Download Now