Recover from a Trojan or virus

If you know what specific malicious program has infected your computer, you can visit one of several anti-virus web sites and download a removal tool. Chances are, however, that you will not be able to identify the specific program. Unfortunately your other choices are limited, but the following steps may help save your computer and your files.   1.  Call IT support If you have an IT support department at your disposal, notify them immediately and follow their instructions.   2.  Disconnect your computer from the Internet Depending on what type of Trojan horse or virus you have, intruders may …

Continue reading Recover from a Trojan or virus

Actually – What is a virus?

What is a virus? A computer virus is a program that spreads by first infecting files or the system areas of a computer or network router’s hard drive and then making copies of itself. Some viruses are harmless, others may damage data files, and some may destroy files. Viruses used to be spread when people shared floppy disks and other portable media, now viruses are primarily spread through email messages. Unlike worms, viruses often require some sort of user action (e.g., opening an email attachment or visiting a malicious web page) to spread. What do viruses do? A virus is …

Continue reading Actually – What is a virus?

Europeans most at risk from surge in Dyre malware attacks June2015

The Dyre malware campaign returned with nasty new features in the first three months of 2015 causing a spike in infections, Trend Micro has reported. The company said that infections of the malware on computers rose 125 percent to around 9,000 in in the period from January to March. Some 39 percent of the infections were in Europe, although North America was only just behind on 38 percent. Infections in Asia-Pacific were lower at 19 percent. French web users were most at risk. Around 34 percent of all infections in the region were in the country, followed by Germany on …

Continue reading Europeans most at risk from surge in Dyre malware attacks June2015

Skeleton Key Malware Analysis

Author: Dell SecureWorks Counter Threat Unit™ Threat Intelligence Date: 12 January 2015 URL: Summary Dell SecureWorks Counter Threat Unit(TM) (CTU) researchers discovered malware that bypasses authentication on Active Directory (AD) systems that implement single-factor (password only) authentication. Threat actors can use a password of their choosing to authenticate as any user. This malware was given the name “Skeleton Key.” CTU researchers discovered Skeleton Key on a client network that used single-factor authentication for access to webmail and VPN, giving the threat actor unfettered access to remote access services. Skeleton Key is deployed as an in-memory patch on a victim’s …

Continue reading Skeleton Key Malware Analysis

DO-NOT-REPLY Datasharp UK Ltd – Monthly Invoice & Report – Word doc malware

DO-NOT-REPLY Datasharp UK Ltd – Monthly Invoice & Report pretending to come from with a malicious word doc attachment  is another one from the current bot runs which try to download various Trojans and password stealers especially banking credential stealers, which may include cridex, dridex, dyreza and various  Zbots, cryptolocker, ransomware and loads of other malware on your computer. They are using email addresses and subjects that will entice a user to read the email and open the attachment. A very high proportion are being targeted at small and medium size businesses, with the hope of getting a better response than they …

Continue reading DO-NOT-REPLY Datasharp UK Ltd – Monthly Invoice & Report – Word doc malware

CERT-In alerts online banking customers to be aware of Dyreza Trojan

Indian online banking customers are at risk. Yes, Cyber security sleuths have alerted online banking customers in the country, that some hackers have been spreading the deadly ‘Trojan’ virus which steals classified data and passwords of a vulnerable…

Continue reading “CERT-In alerts online banking customers to be aware of Dyreza Trojan”

The algorithm of the Trojan

The trojan horse which I have created appears itself as an antivirus program that scans the computer for malware programs. However, in reality it does nothing other than eating up the hard disk space on the root drive by filling it up with a huge junk file. The rate at which it fills up the hard disk space it too high. As a result, the the root drive gets filled up completely with in minutes of running this program. Once the disk space is full, the trojan reports that the scan is complete. The victim will not be able to …

Continue reading The algorithm of the Trojan

List of Trojan Creation Programs or Software

This list is here to make sure you know how to defend yourself. Links …well search yourself.   RAT?  means Remote Administration Tools. Xtreme Rat HerpesNet MicroRat SpyNet ZeuS (Bot) SpyEye (Bot) LostDoor DeeperRat Apocalypse Arabian Attacker Cerberus CyberEye Poison Ivy Daleth RAT DarkMoon DRAT 2009 Erebus Golden Phoenix Rat GraphicBooting RAT m0sck3r MiniMo miniRAT MofoTro NetDevil NovaLite Nuclear Omerta13 Optix Pocket RAT ProRat SharpEye-Rat solitude_1.0 SubSeven_2.3 Synrat v4.3.1 theef_210 Turkojan4 Vanguard Venomous Ivy VorteX RAT Y3kRat2k5RC10 Yuri_V12 xHacker

Continue reading List of Trojan Creation Programs or Software