DailyExposition

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Saturday, May 25, 2013

Infostealer!gen4

Posted on 11:15 AM by Unknown
This malware was first identified by Symantec, and this is the signature for a family fo Trojans which as you can guess from the name is meant to steal passwords and user information. This malware is actually not very common, and it is actually a low threat, but the malware does have some unique characteristics that make it difficult for an antivirus product to detect it. Now since the malware is such a low threat there is a good chance that your antivirus product already has the signatures in its database or heuristics engine never the less lets jump in.





Effects
This malware will get onto your computer and try to use an encryption method from the program/file, and it tries to slip by the antivirus program that you are using. It will then try to get private information from your browsers saved passwords form, and it will try to gather information from email clients that might be on the computer. This malware is also hard to detect because of the encryption method that it is using but with all malware there is a sign that your computer might be infected.

Detection
If you believe that your computer is infected with this malware then there are some hints that you can use to try and diagnose the computer. The first thing is that your computer will be slower, and this is generally associated with all malware so you can tell that something is wrong with your computer. You might also notice account warnings from Google or another company warning about someone attempting an unauthorized access to your account. There is a chance you can't access your email client or other online accounts.

Removal
You can remove the malware by using the secondary scanners below, and they will detect the malware. However you need to realize that if one of them says that your computer is safe there is still a chance that the computer is infected with some sort of malware. So make sure to use two or three of the scanners below. I recommend that you use Malwarebytes and HitmanPro because they are the most powerful secondary scanners on the market. With this malware we also recommend that you change any and all passwords that could have been compromised from this attack, because if you don't the person that sent you the malware might be able to access your accounts and change the log in information.

Protection
If you want to protect against the malware you will want an up to date antivirus and firewall. I recommend that you use Ad Aware Antivirus or Avast Free Antivirus because these two have always found malware that someone else has missed. But make sure that you only use one of the above antivirus products because we want to avoid confliction between them. For your firewall I recommend that you use Comodo free firewall which offers the best HIPS protection in the industry, and it contains a ton of extra features like the Sandbox and the Comodo Kiosk.

Secondary Malware Scanners 
HitmanPro: http://www.surfright.nl/en/hitmanpro/
Panda Active Scan: http://www.pandasecurity.com/homeusers/solutions/activescan/
Malwarebytes: http://www.malwarebytes.org/
Super AntiSpyware: http://www.superantispyware.com/
Bitdefender Quick Scan: http://quickscan.bitdefender.com/
Norton Power Eraser: http://security.symantec.com/nbrt/npe.aspx
Email ThisBlogThis!Share to XShare to Facebook
Posted in malware encyclopedia | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Gaming Communities
    Many gamers out there are looking for quality content and are looking to get their name out there. Now what if I said I found a website that...
  • What Is Adware
    Adware one of the most commonly misunderstood form of malware right next to the common virus. The issue with Adware is people try to assume...
  • What Is Quick Scoping
    Many people in call of duty say that they are good at quick scoping, and many people don't know what this is. So in this article I will ...
  • Which Internet Browser Should I Use
    Most people have heard of the big 3 or 5 internet browsers . However many of you don't know of the many other internet browsers out ther...
  • Youtube Monetization Not Available In Your Country
    As we all know today thousands maybe millions of users are not able to monetize their newly submitted videos. Now Google at the time of this...
  • Free Online Classes
    Coursera is a website that offers college classes for free to anyone who knows how to use the internet. They started this website under the ...
  • Tera Sorcerer Skill List
    Before I go into the full skill list let me break down what the sorcerer is. The sorcerer in Tera is a character of mass destruction. They a...
  • Black Ops 2 Review
    Black-ops 2 is another game in the well known Call of Duty series. This game is a lot like all the other games it has multiplayer, and it is...
  • Internet Browser Test Results
    From my last post on this issue someone pointed out that it looked like I was favoring Google Chrome. Now while I like its UI the best it sc...
  • List Of Second Opinon Malware Scanners
    Why Do I Need A Secondary  Malware  Scanner? You want a secondary scanner because no 1 antivirus program can keep you safe from every threat...

Categories

  • 2013
  • 2013 Total Security
  • Android
  • Anti-Virus
  • antivirus
  • Apple
  • Asynchrony
  • Bitdefender
  • Bitdefender Wallet
  • Blackberry
  • Car dealership
  • cloud storage
  • CNET
  • Computer Support
  • computers
  • coupons
  • CX
  • Data loss
  • Direct selling
  • Download
  • Editor's Choice
  • forums
  • free software
  • Gamer
  • gaming
  • general
  • Google
  • HTML
  • internet
  • Internet access
  • ios 6 jailbreak
  • iOS 6.1 Jailbreak Tweaks
  • Jumpshot
  • LeBron James
  • Linux
  • Loader (computing)
  • loading
  • malware
  • malware encyclopedia
  • Miami Heat
  • Microsoft
  • Mobile security
  • Nokia
  • PageSpeed
  • Personal computer
  • Play Station 4
  • Product Reviews
  • Program
  • Programming
  • science
  • Searching
  • security
  • Servers
  • Shareware
  • SONY
  • technology
  • Tesla
  • Tesla Motors
  • top 5 ios
  • top 5 ios 6 cydia tweaks
  • Trade
  • videogames
  • Web page
  • Website
  • White House
  • Windows
  • Windows 8
  • Windows Update
  • worm
  • Xbox
  • Xbox 360
  • Xbox One
  • Yahoo
  • Youtube

Blog Archive

  • ▼  2013 (170)
    • ►  September (15)
    • ►  August (13)
    • ►  July (13)
    • ►  June (16)
    • ▼  May (29)
      • Editor's Choice For Best Paid Antivirus Program
      • Editors Choice For Best Free Antivirus Software
      • Bitdefender Free Antivirus Review
      • Trojan.Zbot!gen44
      • Infostealer!gen4
      • Skype Might Not Be That Private
      • Trojan.Blackrev
      • Best Microsoft Office Replacements (Desktop)
      • Trojan.Zbot!gen41
      • Skype Bitcoin Malware
      • Comodo Firewall 6 Review
      • Malware Removal Guide
      • W32.Phopifas!gen2
      • Issues With The American Patent System
      • Packed.Generic.410
      • Malware: WN32.Changeup!gen41
      • Slde Show Images
      • Contact Us
      • Free Daily Software
      • Securing Your Computer For Free Complete Guide
      • Malware: Trojan:Win32/Urausy.D
      • What Is A Trojan:JS/Seedabutor.B
      • What Is RAM?
      • What Is A VPN?
      • Editors Choice Badge
      • Understanding Types Of Hackers
      • Blog Archive
      • List Of Second Opinon Malware Scanners
      • What Is A Second Opinon Malware Scanner?
    • ►  April (28)
    • ►  March (30)
    • ►  February (22)
    • ►  January (4)
Powered by Blogger.

About Me

Unknown
View my complete profile