Protect your privacy with new targets for August 2010 (0149.337-0149.371)

by Andy on August 18th, 2010 in Definition File Updates.


BACKDOORS
Backdoors may open up ports on the compromised computer, allowing remote access and control of the victim's machine.



BAT.Backdoor.RA-based
Win32.Backdoor.Blazebot
 
ADWARE
Adware is a type of advertising display software that delivers advertising content potentially in a manner or context that may be unexpected and unwanted by users.
Many adware applications also perform tracking functions, and therefore may also be categorized as tracking technologies. Some consumers may want to remove adware if they object to such tracking, do not wish to see the advertising caused by the program, or are frustrated by its effects on system performance.


MSIL.Adware.Agent


ROGUE ANTI-SPYWARE APPLICATIONS
Rogue anti-spyware applications may give exaggerated threat reports on the
compromised computer, and then ask the user to purchase a registered version
to remove those reported threats.


Win32.FraudTool.MySecurityShield
Win32.Fraudtool.SecuritySuite


MONITORS
Monitors are surveillance tools that for example monitors users keystrokes and it therefore may compromise user privacy if it is used in a bad manner.


Win32.Monitor.SpyLantern


TROJANS
Trojans (also known as Trojan Horses) are programs that appear to do one thing but actually do another. Trojans may also download additional files to the infected system.


Win32.Trojan.Tierry


DOWNLOADERS
Downloaders are programs designed to retrieve and install additional files. Downloaders can be useful tools for consumers to automate upgrades of essential
software such as operating system upgrades, browsers, anti-virus applications, anti-spyware tools, games and other useful applications. Unauthorized downloaders are used by third parties to download potentially unwanted software without user notification or consent.


Win32.TrojanDownloader.DNSKrab


TROJANSPIES
Trojan.Spy is a type of malicious program that can steal information such as passwords, surfing habits, credit card details and email addresses.
Win32.TrojanSpy.AutoLogger
 
WORMS
Worms are network malware, primarily replicating on networks. Usually, a worm will
execute itself automatically on a remote machine without any extra help from a user. However, there are worms, such as mass-mailer worms, that will not always automatically execute themselves without the help of a user.
 
VBS.P2PWorm.ShareWire
 
MISCELLANEOUS MALWARE
This grouping contains other programs with malicious intentions.



SWF.Exploit.Agent