DailyExposition

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Sunday, May 12, 2013

W32.Phopifas!gen2

Posted on 8:23 PM by Unknown

This family of malware is known as the Phopifas family. This is another family of worms that has done some major damage in the past. Just last year alone Phopifas!gen1 was responsible for 2.5 million infections. This was a wide spread malware at the time, and it started with the rise of Skype. Now while it is not as well known today this malware is a smaller threat to companies such as Symantec and Bitdefender who have labeled this threat as Low Level Risk. The reason for this was the malware is not widely spread, and the malware has already been identified once.


Origin 
The origin of this malware was first found via a Skype link were there was a message along the lines of Were did you get this picture? Or is this picture really of you? Or even i cant believe that you would do that. These messages want the user to click the link to see what the image is unfortunately they don't know they are headed to a malicious site. This malware has been transferred in many other forms of social networks including Facebook. After they go to the download page they download the image in a ZIP file which strikes many people as odd but they continue with it anyways. The malware is in the folder and is apparently the second downloaded item.

Effects
This malware has in some cases contained some other forms of malware such as trojans. However since the malware has been used by many other people it is hard to tell what the exact type of malware was being spread. The purpose of the worm is to spread its self to other users by using the same social media source that it originated from. So one person get the worm then their skype account sends out the same message that they received to spread the malware even more. Now the other malware that the ZIP file contains has mostly been isolated to trojans, however some cases have been reported to contain viruses, rootkits, and others. As with any worm be sure to avoid using a USB drive or connecting to your internet or there is a risk that this malware will spread to other users on the same network.

Removal
The removal process is quiet simple you will want to delete the zip file that you downloaded and use one of the secondary scanners below. After that I recommend that you change your Skype password because it might have been compromised during the infection. Now if your antivirus is not detecting or removing the malware then you can try booting into safe mode and deleting the file that way to wipe it out for good.

Protection
As always have some sort of antivirus and firewall installed on your computer and make sure that they are being updated daily. Even if you have these installed to click on any suspicious links that you may come across on skype or Facebook. The reason is if the malware is new and the company does not have it in their signatures or database then you will be in trouble because the antivirus program cant help you. So just because your system is protected don't be daring and try to download the file.

Secondary Malware Scanners 
HitmanPro: http://www.surfright.nl/en/hitmanpro/
Panda Active Scan: http://www.pandasecurity.com/homeusers/solutions/activescan/
Malwarebytes: http://www.malwarebytes.org/
Super AntiSpyware: http://www.superantispyware.com/
Bitdefender Quick Scan: http://quickscan.bitdefender.com/
Norton Power Eraser: http://security.symantec.com/nbrt/npe.aspx
Email ThisBlogThis!Share to XShare to Facebook
Posted in malware, malware encyclopedia, worm | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Gaming Communities
    Many gamers out there are looking for quality content and are looking to get their name out there. Now what if I said I found a website that...
  • What Is Adware
    Adware one of the most commonly misunderstood form of malware right next to the common virus. The issue with Adware is people try to assume...
  • What Is Quick Scoping
    Many people in call of duty say that they are good at quick scoping, and many people don't know what this is. So in this article I will ...
  • Which Internet Browser Should I Use
    Most people have heard of the big 3 or 5 internet browsers . However many of you don't know of the many other internet browsers out ther...
  • Youtube Monetization Not Available In Your Country
    As we all know today thousands maybe millions of users are not able to monetize their newly submitted videos. Now Google at the time of this...
  • Free Online Classes
    Coursera is a website that offers college classes for free to anyone who knows how to use the internet. They started this website under the ...
  • Tera Sorcerer Skill List
    Before I go into the full skill list let me break down what the sorcerer is. The sorcerer in Tera is a character of mass destruction. They a...
  • Black Ops 2 Review
    Black-ops 2 is another game in the well known Call of Duty series. This game is a lot like all the other games it has multiplayer, and it is...
  • Internet Browser Test Results
    From my last post on this issue someone pointed out that it looked like I was favoring Google Chrome. Now while I like its UI the best it sc...
  • List Of Second Opinon Malware Scanners
    Why Do I Need A Secondary  Malware  Scanner? You want a secondary scanner because no 1 antivirus program can keep you safe from every threat...

Categories

  • 2013
  • 2013 Total Security
  • Android
  • Anti-Virus
  • antivirus
  • Apple
  • Asynchrony
  • Bitdefender
  • Bitdefender Wallet
  • Blackberry
  • Car dealership
  • cloud storage
  • CNET
  • Computer Support
  • computers
  • coupons
  • CX
  • Data loss
  • Direct selling
  • Download
  • Editor's Choice
  • forums
  • free software
  • Gamer
  • gaming
  • general
  • Google
  • HTML
  • internet
  • Internet access
  • ios 6 jailbreak
  • iOS 6.1 Jailbreak Tweaks
  • Jumpshot
  • LeBron James
  • Linux
  • Loader (computing)
  • loading
  • malware
  • malware encyclopedia
  • Miami Heat
  • Microsoft
  • Mobile security
  • Nokia
  • PageSpeed
  • Personal computer
  • Play Station 4
  • Product Reviews
  • Program
  • Programming
  • science
  • Searching
  • security
  • Servers
  • Shareware
  • SONY
  • technology
  • Tesla
  • Tesla Motors
  • top 5 ios
  • top 5 ios 6 cydia tweaks
  • Trade
  • videogames
  • Web page
  • Website
  • White House
  • Windows
  • Windows 8
  • Windows Update
  • worm
  • Xbox
  • Xbox 360
  • Xbox One
  • Yahoo
  • Youtube

Blog Archive

  • ▼  2013 (170)
    • ►  September (15)
    • ►  August (13)
    • ►  July (13)
    • ►  June (16)
    • ▼  May (29)
      • Editor's Choice For Best Paid Antivirus Program
      • Editors Choice For Best Free Antivirus Software
      • Bitdefender Free Antivirus Review
      • Trojan.Zbot!gen44
      • Infostealer!gen4
      • Skype Might Not Be That Private
      • Trojan.Blackrev
      • Best Microsoft Office Replacements (Desktop)
      • Trojan.Zbot!gen41
      • Skype Bitcoin Malware
      • Comodo Firewall 6 Review
      • Malware Removal Guide
      • W32.Phopifas!gen2
      • Issues With The American Patent System
      • Packed.Generic.410
      • Malware: WN32.Changeup!gen41
      • Slde Show Images
      • Contact Us
      • Free Daily Software
      • Securing Your Computer For Free Complete Guide
      • Malware: Trojan:Win32/Urausy.D
      • What Is A Trojan:JS/Seedabutor.B
      • What Is RAM?
      • What Is A VPN?
      • Editors Choice Badge
      • Understanding Types Of Hackers
      • Blog Archive
      • List Of Second Opinon Malware Scanners
      • What Is A Second Opinon Malware Scanner?
    • ►  April (28)
    • ►  March (30)
    • ►  February (22)
    • ►  January (4)
Powered by Blogger.

About Me

Unknown
View my complete profile