Recover from a Trojan or virus

If you know what specific malicious program has infected your computer, you can visit one of several anti-virus web sites and download a removal tool. Chances are, however, that you will not be able to identify the specific program. Unfortunately your other choices are limited, but the following steps may help save your computer and your files.   1.  Call …

Actually – What is a virus?

What is a virus? A computer virus is a program that spreads by first infecting files or the system areas of a computer or network router’s hard drive and then making copies of itself. Some viruses are harmless, others may damage data files, and some may destroy files. Viruses used to be spread when people shared floppy disks and other …

Europeans most at risk from surge in Dyre malware attacks June2015

The Dyre malware campaign returned with nasty new features in the first three months of 2015 causing a spike in infections, Trend Micro has reported. The company said that infections of the malware on computers rose 125 percent to around 9,000 in in the period from January to March. Some 39 percent of the infections were in Europe, although North …

Skeleton Key Malware Analysis

Author: Dell SecureWorks Counter Threat Unit™ Threat Intelligence Date: 12 January 2015 URL: http://www.secureworks.com/cyber-threat-intelligence/threats/skeleton-key-malware-analysis/ Summary Dell SecureWorks Counter Threat Unit(TM) (CTU) researchers discovered malware that bypasses authentication on Active Directory (AD) systems that implement single-factor (password only) authentication. Threat actors can use a password of their choosing to authenticate as any user. This malware was given the name “Skeleton Key.” …

DO-NOT-REPLY Datasharp UK Ltd – Monthly Invoice & Report – Word doc malware

DO-NOT-REPLY Datasharp UK Ltd – Monthly Invoice & Report pretending to come from ebilling@datasharp.co with a malicious word doc attachment  is another one from the current bot runs which try to download various Trojans and password stealers especially banking credential stealers, which may include cridex, dridex, dyreza and various  Zbots, cryptolocker, ransomware and loads of other malware on your computer. They are using …

The algorithm of the Trojan

The trojan horse which I have created appears itself as an antivirus program that scans the computer for malware programs. However, in reality it does nothing other than eating up the hard disk space on the root drive by filling it up with a huge junk file. The rate at which it fills up the hard disk space it too …

List of Trojan Creation Programs or Software

This list is here to make sure you know how to defend yourself. Links …well search yourself.   RAT?  means Remote Administration Tools. Xtreme Rat HerpesNet MicroRat SpyNet ZeuS (Bot) SpyEye (Bot) LostDoor DeeperRat Apocalypse Arabian Attacker Cerberus CyberEye Poison Ivy Daleth RAT DarkMoon DRAT 2009 Erebus Golden Phoenix Rat GraphicBooting RAT m0sck3r MiniMo miniRAT MofoTro NetDevil NovaLite Nuclear Omerta13 Optix …