DailyExposition

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Thursday, May 9, 2013

Malware: WN32.Changeup!gen41

Posted on 5:45 PM by Unknown

A new string of the Changeup family of malware was detected and categorized by Symantec today. This malware is quite strange because it a low level worm. Generally when someone writes a worm it is meant to be very difficult to remove however Symantec marks it as a low level threat. Lets explore this family of malware and explain what it is meant to do to your computer.

Possible Infection Routes

You will contract a worm generally by downloading some sort of unsafe program. However they are also commonly shared by USB drives and the USB was infected for downloading the unsafe program and either it replicated its self onto the USB, or it was installed onto it. Since it is a worm we also know that it was possibly spread through the network from another infected machine. This is one of the reason any Network Manager or IT professional hates to deal with worms.

Effects

This malware is very similar in its effects compared to any form of worm. It will set its self to autorun so that it will always run with the computer on start up. This is so common with malware that it is almost not worth mentioning. The worm is meant for two main things. The first thing being that a worm spreads to other users through any means necessary. The second main thing is to download more malware onto the computer. This malware is generally trojans that will steal information from your computer. Now think about this the worm spreads to as many computers as it can. It will then try to download trojans and more malware onto the computer. This technique is meant to steal as much information (credit card, banking, etc..) so the author can make money. There is also a thought that these worms are part of an affiliate scheme to were the author says if you pay me (insert dollar amount here) then I will get this many downloads.

Removal

Scan your computer with any secondary scanners at the bottom of this post. You should also check anyone else that was on your network or if you used a flash drive. While you might get malware from the flash drive your antivirus product will detect it if it was already updated. You will want to disconnect your self from the internet if you feel like your computer does have the malware after you downloaded a scanner. The reason for this is you want to reduce any chances of getting the malware onto another computer or it makes removing it that much more difficult.

Protection

Don't download any programs if you cant prove that they are safe or if they are from a trusted partner of the owners. For instance I could download Microsoft word but if I got it from some random site then even though the product is safe they might have added malware to that package. You should also keep an updated antivirus product on your computer to protect it in case you do run into the malware.

Secondary Scanners

HitmanPro: http://www.surfright.nl/en/hitmanpro/
Panda Active Scan: http://www.pandasecurity.com/homeusers/solutions/activescan/
Malwarebytes: http://www.malwarebytes.org/
Super AntiSpyware: http://www.superantispyware.com/
Bitdefender Quick Scan: http://quickscan.bitdefender.com/
Norton Power Eraser: http://security.symantec.com/nbrt/npe.aspx
Email ThisBlogThis!Share to XShare to Facebook
Posted in malware, malware encyclopedia | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Gaming Communities
    Many gamers out there are looking for quality content and are looking to get their name out there. Now what if I said I found a website that...
  • What Is Adware
    Adware one of the most commonly misunderstood form of malware right next to the common virus. The issue with Adware is people try to assume...
  • What Is Quick Scoping
    Many people in call of duty say that they are good at quick scoping, and many people don't know what this is. So in this article I will ...
  • Which Internet Browser Should I Use
    Most people have heard of the big 3 or 5 internet browsers . However many of you don't know of the many other internet browsers out ther...
  • Youtube Monetization Not Available In Your Country
    As we all know today thousands maybe millions of users are not able to monetize their newly submitted videos. Now Google at the time of this...
  • Free Online Classes
    Coursera is a website that offers college classes for free to anyone who knows how to use the internet. They started this website under the ...
  • Tera Sorcerer Skill List
    Before I go into the full skill list let me break down what the sorcerer is. The sorcerer in Tera is a character of mass destruction. They a...
  • Black Ops 2 Review
    Black-ops 2 is another game in the well known Call of Duty series. This game is a lot like all the other games it has multiplayer, and it is...
  • Internet Browser Test Results
    From my last post on this issue someone pointed out that it looked like I was favoring Google Chrome. Now while I like its UI the best it sc...
  • List Of Second Opinon Malware Scanners
    Why Do I Need A Secondary  Malware  Scanner? You want a secondary scanner because no 1 antivirus program can keep you safe from every threat...

Categories

  • 2013
  • 2013 Total Security
  • Android
  • Anti-Virus
  • antivirus
  • Apple
  • Asynchrony
  • Bitdefender
  • Bitdefender Wallet
  • Blackberry
  • Car dealership
  • cloud storage
  • CNET
  • Computer Support
  • computers
  • coupons
  • CX
  • Data loss
  • Direct selling
  • Download
  • Editor's Choice
  • forums
  • free software
  • Gamer
  • gaming
  • general
  • Google
  • HTML
  • internet
  • Internet access
  • ios 6 jailbreak
  • iOS 6.1 Jailbreak Tweaks
  • Jumpshot
  • LeBron James
  • Linux
  • Loader (computing)
  • loading
  • malware
  • malware encyclopedia
  • Miami Heat
  • Microsoft
  • Mobile security
  • Nokia
  • PageSpeed
  • Personal computer
  • Play Station 4
  • Product Reviews
  • Program
  • Programming
  • science
  • Searching
  • security
  • Servers
  • Shareware
  • SONY
  • technology
  • Tesla
  • Tesla Motors
  • top 5 ios
  • top 5 ios 6 cydia tweaks
  • Trade
  • videogames
  • Web page
  • Website
  • White House
  • Windows
  • Windows 8
  • Windows Update
  • worm
  • Xbox
  • Xbox 360
  • Xbox One
  • Yahoo
  • Youtube

Blog Archive

  • ▼  2013 (170)
    • ►  September (15)
    • ►  August (13)
    • ►  July (13)
    • ►  June (16)
    • ▼  May (29)
      • Editor's Choice For Best Paid Antivirus Program
      • Editors Choice For Best Free Antivirus Software
      • Bitdefender Free Antivirus Review
      • Trojan.Zbot!gen44
      • Infostealer!gen4
      • Skype Might Not Be That Private
      • Trojan.Blackrev
      • Best Microsoft Office Replacements (Desktop)
      • Trojan.Zbot!gen41
      • Skype Bitcoin Malware
      • Comodo Firewall 6 Review
      • Malware Removal Guide
      • W32.Phopifas!gen2
      • Issues With The American Patent System
      • Packed.Generic.410
      • Malware: WN32.Changeup!gen41
      • Slde Show Images
      • Contact Us
      • Free Daily Software
      • Securing Your Computer For Free Complete Guide
      • Malware: Trojan:Win32/Urausy.D
      • What Is A Trojan:JS/Seedabutor.B
      • What Is RAM?
      • What Is A VPN?
      • Editors Choice Badge
      • Understanding Types Of Hackers
      • Blog Archive
      • List Of Second Opinon Malware Scanners
      • What Is A Second Opinon Malware Scanner?
    • ►  April (28)
    • ►  March (30)
    • ►  February (22)
    • ►  January (4)
Powered by Blogger.

About Me

Unknown
View my complete profile