This malware was first identified by Symantec, and this is the signature for a family fo Trojans which as you can guess from the name is meant to steal passwords and user information. This malware is actually not very common, and it is actually a low threat, but the malware does have some unique characteristics that make it difficult for an antivirus product to detect it. Now since the malware is such a low threat there is a good chance that your antivirus product already has the signatures in its database or heuristics engine never the less lets jump in.
Effects
This malware will get onto your computer and try to use an encryption method from the program/file, and it tries to slip by the antivirus program that you are using. It will then try to get private information from your browsers saved passwords form, and it will try to gather information from email clients that might be on the computer. This malware is also hard to detect because of the encryption method that it is using but with all malware there is a sign that your computer might be infected.
Detection
If you believe that your computer is infected with this malware then there are some hints that you can use to try and diagnose the computer. The first thing is that your computer will be slower, and this is generally associated with all malware so you can tell that something is wrong with your computer. You might also notice account warnings from Google or another company warning about someone attempting an unauthorized access to your account. There is a chance you can't access your email client or other online accounts.
Removal
You can remove the malware by using the secondary scanners below, and they will detect the malware. However you need to realize that if one of them says that your computer is safe there is still a chance that the computer is infected with some sort of malware. So make sure to use two or three of the scanners below. I recommend that you use Malwarebytes and HitmanPro because they are the most powerful secondary scanners on the market. With this malware we also recommend that you change any and all passwords that could have been compromised from this attack, because if you don't the person that sent you the malware might be able to access your accounts and change the log in information.
Protection
If you want to protect against the malware you will want an up to date antivirus and firewall. I recommend that you use Ad Aware Antivirus or Avast Free Antivirus because these two have always found malware that someone else has missed. But make sure that you only use one of the above antivirus products because we want to avoid confliction between them. For your firewall I recommend that you use Comodo free firewall which offers the best HIPS protection in the industry, and it contains a ton of extra features like the Sandbox and the Comodo Kiosk.
Secondary Malware Scanners
HitmanPro: http://www.surfright.nl/en/hitmanpro/
Panda Active Scan: http://www.pandasecurity.com/homeusers/solutions/activescan/
Malwarebytes: http://www.malwarebytes.org/
Super AntiSpyware: http://www.superantispyware.com/
Bitdefender Quick Scan: http://quickscan.bitdefender.com/
Norton Power Eraser: http://security.symantec.com/nbrt/npe.aspx
Saturday, May 25, 2013
Subscribe to:
Post Comments (Atom)

0 comments:
Post a Comment