Protect your privacy with new targets for July 2011

by LS Anders on July 19th, 2011 in Definition File Updates.

BACKDOORS
Backdoors may open up ports on the compromised computer, allowing remote access and control of the victim's machine.
Win32.Backdoor.Zegost

DOWNLOADERS
Downloaders are programs designed to retrieve and install additional files. Downloaders can be useful tools for consumers to automate upgrades of essential software such as operating system upgrades, browsers, anti-virus applications, anti-spyware tools, games and other useful applications. Unauthorized downloaders are used by third parties to download potentially unwanted software without user notification or consent.
Win32.TrojanDownloader.Delfl
Win32.TrojanDownloader.Informer

PASSWORD STEALERS
Password stealers can steal user passwords on an infected system, compromising system security and user privacy.
Win32.TrojanPWS.Sanera
Win32.TrojanPWS.Yy

ROGUE ANTI-SPYWARE APPLICATIONS
Rogue anti-spyware applications may give exaggerated threat reports on the compromised computer, and then ask the user to purchase a registered version to remove those reported threats.
Win32.FraudTool.AntiMalwareLab
Win32.FraudTool.PersonalShieldPro
Win32.FraudTool.WindowsAccurateProtector
Win32.FraudTool.WindowsAntispyNetwork
Win32.FraudTool.WindowsArmatureMaster
Win32.FraudTool.WindowsArmourMaster
Win32.FraudTool.WindowsDebuggingAgent
Win32.FraudTool.WindowsDebuggingCenter
Win32.FraudTool.WindowsInviolabilitySystem
Win32.FraudTool.WindowsMicrosoftGuardian
Win32.FraudTool.WindowsProofnessGuaranator
Win32.FraudTool.WindowsSalvorTool
Win32.FraudTool.WindowsTestMaster
Win32.FraudTool.WindowsVulnerabilitiesRescuer
Win32.FraudTool.WindowsXPFix
Win32.FraudTool.WindowsXPRepair

TROJANS
Trojans (also known as Trojan Horses) are programs that appear to do one thing but actually do another. Trojans may also download additional files to the infected system.
Win32.TrojanRansom.Foreign
Win32.TrojanRansom.Ntldblocker

TROJANDDOS
TrojanDDoS applicaitons provides functionality that makes it possible for an attacker to send massive amount of data to a specific target. The flooding of a target may for an example disturb communication services or make various systems unresponsive.
Win32.TrojanDDoS.Chalcol
Win32.TrojanDDoS.Mixter

TROJANDROPPERS
Trojan.Droppers will drop additional files on the infected system. These files are often other trojans or downloaders.
Win32.TrojanDropper.Cidox
Win32.TrojanDropper.Rsrc
Win32.TrojanDropper.Zaccess

TROJANSPIES
Trojan.Spy is a type of malicious program that can steal information such as passwords, surfing habits, credit card details and email addresses.
Win32.TrojanSpy.Activator

WORMS
Worms are network malware, primarily replicating on networks. Usually, a worm will execute itself automatically on a remote machine without any extra help from a user. However, there are worms, such as mass-mailer worms, that will not always automatically execute themselves without the help of a user.
Win32.Worm.Ngrbot
Win32.Worm.Qaz
Win32.Worm.Riskrun

MISCELLANEOUS
This grouping contains other programs
Win32.Rootkit.Cidox
Win64.Rootkit.Cidox