Protect your privacy with new targets for March 2009 (0146.0010-0146.0022)

by Albin on March 12th, 2009 in Definition File Updates.

Protect your privacy with new targets for March 2009 (0146.0010-0146.0022)

Newly created families for March (0146.0010-0146.0022)

Adware

Adware is a type of advertising display software that delivers advertising content potentially in a manner or context that may be unexpected and unwanted by users. Many adware applications also perform tracking functions, and therefore may also be categorized as tracking technologies. Some consumers may want to remove adware if they object to such tracking, do not wish to see the advertising caused by the program, or are frustrated by its effects on system performance.

Adware.AdAgent
Adware.ADSTechnology
Adware.Advision
Adware.eAnthology
Adware.HeadClick
Adware.Helper
Adware.MaxSearch
Adware.Nexs
Adware.PolyBrow
Adware.PopAd
Adware.Searchbot
Adware.Ubar
Adware.WindowEnhancer


Backdoors


Backdoors may open up ports on the compromised computer, allowing remote access and control of the victim's machine.

Win32.Backdoor.DestructBot
Win32.Backdoor.IEBooot
Win32.Backdoor.IRC.Agent
Win32.Backdoor.IRC.Ataka
Win32.Backdoor.IRC.Batter
Win32.Backdoor.IRC.BlackCode
Win32.Backdoor.IRC.Bnc
Win32.Backdoor.IRC.ColdLife
Win32.Backdoor.IRC.Digarix
Win32.Backdoor.IRC.Jemput
Win32.Backdoor.IRC.Kaiten
Win32.Backdoor.IRC.Lambot
Win32.Backdoor.IRC.Microb
Win32.Backdoor.IRC.Prison
Win32.Backdoor.IRC.Smev
Win32.Backdoor.IRC.Zcrew
Win32.Backdoor.Julio
Win32.Backdoor.Mesub
Win32.Backdoor.RemoteOp
Win32.Backdoor.Rybot
Win32.Backdoor.Teldoor
Win32.Backdoor.Trippi
Win32.Backdoor.Welkom

Downloaders

Downloaders are programs designed to retrieve and install additional files. Downloaders can be useful tools for consumers to automate upgrades of essential software such as operating system upgrades, browsers, anti-virus applications, anti-spyware tools, games and other useful applications. Unauthorized downloaders are used by third parties to download potentially unwanted software without user notification or consent.

Win32.TrojanDownloader.Boltolog
Win32.TrojanDownloader.Halinker
Win32.TrojanDownloader.Onestage
Win32.TrojanDownloader.PepperPaper
Win32.TrojanDownloader.Pif
Win32.TrojanDownloader.Sinique
Win32.TrojanDownloader.SWF.Gida
Win32.TrojanDownloader.Wintool
Win32.TrojanDownloader.Wren


Flooders

Flooders may provide functionality that makes it possible for an attacker to send massive amount of data to a specific target. The flooding of a target may for an example disturb communication services or make various systems unresponsive. This is similar to a DDoS attack where a massive amounts of calls are launched against a system. A DDos attack may even make large systems unresponsive if the attack is launched from several computer systems that are infected by a DDoS capable Trojan Horse.    

Win32.Flooder.ArpPack
Win32.Flooder.Bomber
Win32.Flooder.ICQ
Win32.Flooder.Misoka
Win32.Flooder.MPCLagger
Win32.Flooder.Teamspeak

 

Monitors

Monitors are surveillance tools that for example monitors users keystrokes and it therefore may compromise user privacy if it is used in a bad manner.

Win32.Monitor.EZRecKb
Win32.Monitor.IMonitorPC
Win32.Monitor.PCPolice
Win32.Monitor.XPAdvancedKeylogger        

Password Stealers

Password stealers can steal user passwords on an infected system,compromising system security and user privacy.

Win32.TrojanPWS.Crtz
Win32.TrojanPWS.Element
Win32.TrojanPWS.LdPlog
Win32.TrojanPWS.Logon
Win32.TrojanPWS.Mailview
Win32.TrojanPWS.Qipi
Win32.TrojanPWS.Staem
Win32.TrojanPWS.Steathie
Win32.TrojanPWS.XShadow
Win32.TrojanPWS.Yahoospy

Rogue Anti-Spyware Applications

Rogue anti-spyware applications may give exaggerated threat reports on the
compromised computer, and then ask the user to purchase a registered version
to remove those reported threats.

AntispywarePro2009
KillandClean
MalwareDefender2009
MalwareDoc
PrivacyComponents
SpywareFighter
SpywareRemover2009
TotalVirusProtection
XPVirusProtection

Trojans

Trojans (also known as Trojan Horses) are programs that appear to do one thing but actually do another. Trojans may also download additional files to the infected system.

Win32.Trojan.Akopt
Win32.Trojan.Antihosts
Win32.Trojan.AVKill
Win32.Trojan.Cafelom
Win32.Trojan.FakeSecSen
Win32.Trojan.Feedel
Win32.Trojan.Keygen
Win32.Trojan.KillSAP
Win32.Trojan.KillSys
Win32.Trojan.KillXP
Win32.Trojan.Medias
Win32.Trojan.Olmarik
Win32.Trojan.Punad
Win32.Trojan.Rabbit
Win32.Trojan.Ramag
Win32.Trojan.Renaz
Win32.Trojan.Urbin
Win32.Trojan.Warrock
Win32.Trojan.Vhorse
Win32.Trojan.Yaccount

Trojan.Clickers

Trojan.Clicker’s may cause the victims machine to contact a target webpage without the users knowledge or consent to falsify data about the number of times the webpage is visited.

Win32.TrojanClicker.AutoIT
Win32.TrojanClicker.Hatigh
Win32.TrojanClicker.Zirit

TrojanDDos

TrojanDDoS applicaitons provides functionality that makes it possible for an attacker to send massive amount of data to a specific target. The flooding of a target may for an example disturb communication services or make various systems unresponsive.

Win32.TrojanDDoS.Rada
Win32.TrojanDDoS.Small
Win32.TrojanDDoS.VB

TrojanDroppers

Trojan.Droppers will drop additional files on the infected system. These files are often other trojans or downloaders.    

Win32.TrojanDropper.Arbinder
Win32.TrojanDropper.Autoit
Win32.TrojanDropper.CPM
Win32.TrojanDropper.FraudLoad
Win32.TrojanDropper.MSPPoint
Win32.TrojanDropper.PcClient
Win32.TrojanDropper.Wlord

TrojanProxy's

Trojan.Proxy's may open up the infected machine to be used as a proxy server.    

Win32.TrojanProxy.Prodoom

TrojanSpies

Trojan.Spy is a type of malicious program that can steal information such as passwords, surfing habits, credit card details and email addresses.

Win32.TrojanSpy.Agent
Win32.TrojanSpy.BrowserResend
Win32.TrojanSpy.Finanz
Win32.TrojanSpy.Kakkeys
Win32.TrojanSpy.Muspy
Win32.TrojanSpy.Radkey
Win32.TrojanSpy.Screen
Win32.TrojanSpy.SearSe
Win32.TrojanSpy.Spykis
Win32.TrojanSpy.TianYan
Win32.TrojanSpy.Wildtangent
Win32.TrojanSpy.WMForce

Worms

Worms are network malware, primarily replicating on networks. Usually, a worm will execute itself automatically on a remote machine without any extra help from a user. However, there are worms, such as mass-mailer worms, that will not always automatically execute themselves without the help of a user.

Win32.Worm.Angel
Win32.Worm.Bomzh
Win32.Worm.Dao
Win32.Worm.Entrophy
Win32.Worm.GameCrack
Win32.Worm.Halfint
Win32.Worm.Infober
Win32.Worm.Injector
Win32.Worm.Kober
Win32.Worm.McMaggot
Win32.Worm.Nikmat
Win32.Worm.Podik
Win32.Worm.Protoride
Win32.Worm.Shark
Win32.Worm.Shelp
Win32.Worm.Slammer
Win32.Worm.tLook
Win32.Worm.Yanz
Win32.IRCWorm.Clickit
Win32.IRCWorm.Delarm
Win32.IRCWorm.Desire
Win32.IRCWorm.Flib
Win32.P2PWorm.Palevo

 

Miscellaneous Malware

This grouping contains other programs with malicious intentions.

Win32.DoS.Adonai
Win32.DoS.Aftpkill
Win32.DoS.Awak
Win32.DoS.Bing
Win32.DoS.BlackEnergy
Win32.DoS.Bomber
Win32.DoS.Boom
Win32.DoS.DeepThroat
Win32.DoS.Doraah
Win32.DoS.FakePing
Win32.DoS.Hucsyn
Win32.DoS.Jolt2
Win32.DoS.Kod
Win32.DoS.Krust
Win32.DoS.LamerToy
Win32.DoS.Lankiller
Win32.DoS.Lanxie
Win32.DoS.Lanxue
Win32.DoS.MK3
Win32.DoS.Neonix
Win32.DoS.Nutod
Win32.DoS.Rmc
Win32.DoS.Skyper
Win32.DoS.Small
Win32.DoS.Smsdos
Win32.DoS.Synflood
Win32.DoS.TDK
Win32.DoS.Tejanos
Win32.DoS.TetriCrasher
Win32.TrojanMailfinder.Blen
Win32.TrojanMailfinder.VB
Win32.Hoax.IMPass
Win32.TrojanRansom.VB