Trojan.Zlob.G is a Trojan that comes from a large family of malware. Recent released of this Trojan are involved in the deployment of rogue software, most of them are fake anti-virus products. The threat is capable of downloading and executing remote files. Additionally, Trojan.Zlob.G affects Internet browser by redirecting home page and search page to […]
Win32:Hupigon-ONX [Trj] is part of a Backdoor Trojan family. Study shows that this malware can also come with other variants like Trojan Dropper and Rootkit. Win32:Hupigon-ONX [Trj] is the main component that can open some ports on the computer allowing remote unauthorized access.
Win32:Crypt-OUI [Trj] is a Trojan that brings huge damages to the computer when not taken out right away. Although it is not like a virus that replicates, this Trojan is able to infect and harm other files on the compromised machine. There is a chance that your anti-virus program may detect Win32:Crypt-OUI [Trj] if it […]
LNK:Runner-B [Trj] is a computer threat that commonly acquired by users from compromised web sites. This is also known as the Link Runner Virus. In some instances, malware authors are using spam email messages with the Trojan attach. Through the use of scripts, LNK:Runner-B [Trj] executes when user opens the message.
If you are seeing a pop-up message saying “Please remove ity.im ads from your website” then, your PC may be infected with a rootkit Trojan. This virus can be identified by Windows Defender as Trojan.MBR.Alureon!IK. It simply means that the threat has infected the master boot record (MBR) of the computer and has modified various […]
Win32:Dropper-gen [Drp] is a detection named by Avast to identify harmful program that aims to drop other malware files onto the infected computer. Presence of Win32:Dropper-gen [Drp] can trigger more damages on the PC by fetching other threats from a remote server.
Backdoor:Win32/RDPopen is a harmful Trojan in the wild since Microsoft Security Essentials detected it in June 2012. As of this moment, there are two variants of the Trojan known as Backdoor:Win32/RDPopen.A and Backdoor:Win32/RDPopen.B. Both share the same payload of allowing a remote attacker to gain access on the infected computer. Attacker can stage a number […]
Trojan HTML.Redirector.WD is a computer infection that affects mostly browsers like Internet Explorer, Mozilla Firefox, and Google Chrome. This Trojan is considered as malicious HTML web pages that try to exploits a weakness in your PC. Normally, Trojan HTML.Redirector.WD arrives when user pays a visit to compromised web sites. Threat may also be dropped on […]
Trojan:Win32/Sirefef.AC is a risky Trojan that may bring many changes on the infected computer. Once this threat is inside the system, it can freely alter settings on desktop, add other malware, and modify the registry to run harmful codes when Windows starts. Normally, main payload of Trojan:Win32/Sirefef.AC is to drop other threats including malware, viruses, […]
Win32:Sirefef-FQ [Drp] is a Trojan that is made to drop other malware on the already infected computer. It is using a technique popularly known as rootkit to preserve its presence on the system while hiding its files and modules. This highly perilous threat will enter the PC if you open attached file to spam email […]