DailyExposition

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Thursday, May 9, 2013

Malware: WN32.Changeup!gen41

Posted on 5:45 PM by Unknown

A new string of the Changeup family of malware was detected and categorized by Symantec today. This malware is quite strange because it a low level worm. Generally when someone writes a worm it is meant to be very difficult to remove however Symantec marks it as a low level threat. Lets explore this family of malware and explain what it is meant to do to your computer.

Possible Infection Routes

You will contract a worm generally by downloading some sort of unsafe program. However they are also commonly shared by USB drives and the USB was infected for downloading the unsafe program and either it replicated its self onto the USB, or it was installed onto it. Since it is a worm we also know that it was possibly spread through the network from another infected machine. This is one of the reason any Network Manager or IT professional hates to deal with worms.

Effects

This malware is very similar in its effects compared to any form of worm. It will set its self to autorun so that it will always run with the computer on start up. This is so common with malware that it is almost not worth mentioning. The worm is meant for two main things. The first thing being that a worm spreads to other users through any means necessary. The second main thing is to download more malware onto the computer. This malware is generally trojans that will steal information from your computer. Now think about this the worm spreads to as many computers as it can. It will then try to download trojans and more malware onto the computer. This technique is meant to steal as much information (credit card, banking, etc..) so the author can make money. There is also a thought that these worms are part of an affiliate scheme to were the author says if you pay me (insert dollar amount here) then I will get this many downloads.

Removal

Scan your computer with any secondary scanners at the bottom of this post. You should also check anyone else that was on your network or if you used a flash drive. While you might get malware from the flash drive your antivirus product will detect it if it was already updated. You will want to disconnect your self from the internet if you feel like your computer does have the malware after you downloaded a scanner. The reason for this is you want to reduce any chances of getting the malware onto another computer or it makes removing it that much more difficult.

Protection

Don't download any programs if you cant prove that they are safe or if they are from a trusted partner of the owners. For instance I could download Microsoft word but if I got it from some random site then even though the product is safe they might have added malware to that package. You should also keep an updated antivirus product on your computer to protect it in case you do run into the malware.

Secondary Scanners

HitmanPro: http://www.surfright.nl/en/hitmanpro/
Panda Active Scan: http://www.pandasecurity.com/homeusers/solutions/activescan/
Malwarebytes: http://www.malwarebytes.org/
Super AntiSpyware: http://www.superantispyware.com/
Bitdefender Quick Scan: http://quickscan.bitdefender.com/
Norton Power Eraser: http://security.symantec.com/nbrt/npe.aspx
Email ThisBlogThis!Share to XShare to Facebook
Posted in malware, malware encyclopedia | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • What Is Quick Scoping
    Many people in call of duty say that they are good at quick scoping, and many people don't know what this is. So in this article I will ...
  • Which Internet Browser Should I Use
    Most people have heard of the big 3 or 5 internet browsers . However many of you don't know of the many other internet browsers out ther...
  • Is Internet Explorer Safe?
    There are 3 main browsers used in the world today Microsoft's Internet Explorer. Mozilla's Firefox and Google's Google Chrome. N...
  • What Is A Trojan 32 Generic?
    I got a question from someone asking what a trojan generic 32 is and I am going to explain what it is you should do to remove it and what it...
  • What Is A Black Hole
    A black hole is a theoretical concept in astrophysics that is the remains of a start after it has gone through a super nova. These are thoug...
  • Free Online Classes
    Coursera is a website that offers college classes for free to anyone who knows how to use the internet. They started this website under the ...
  • Iobit Random Password Generator Review
    If you are like me and need to remember a lot of different passwords but also want them to be secure but don't know who to trust well he...
  • Internet Browser Test Results
    From my last post on this issue someone pointed out that it looked like I was favoring Google Chrome. Now while I like its UI the best it sc...
  • What Is Adware
    Adware one of the most commonly misunderstood form of malware right next to the common virus. The issue with Adware is people try to assume...
  • SpyBot Search And Destroy Review
    There are a lot of dedicated users of Spybot search and destroy, and that is because this is the only program that offers very powerful real...

Categories

  • 2013
  • 2013 Total Security
  • Android
  • Anti-Virus
  • antivirus
  • Apple
  • Asynchrony
  • Bitdefender
  • Bitdefender Wallet
  • Blackberry
  • Car dealership
  • cloud storage
  • CNET
  • Computer Support
  • computers
  • coupons
  • CX
  • Data loss
  • Direct selling
  • Download
  • Editor's Choice
  • forums
  • free software
  • Gamer
  • gaming
  • general
  • Google
  • HTML
  • internet
  • Internet access
  • ios 6 jailbreak
  • iOS 6.1 Jailbreak Tweaks
  • Jumpshot
  • LeBron James
  • Linux
  • Loader (computing)
  • loading
  • malware
  • malware encyclopedia
  • Miami Heat
  • Microsoft
  • Mobile security
  • Nokia
  • PageSpeed
  • Personal computer
  • Play Station 4
  • Product Reviews
  • Program
  • Programming
  • science
  • Searching
  • security
  • Servers
  • Shareware
  • SONY
  • technology
  • Tesla
  • Tesla Motors
  • top 5 ios
  • top 5 ios 6 cydia tweaks
  • Trade
  • videogames
  • Web page
  • Website
  • White House
  • Windows
  • Windows 8
  • Windows Update
  • worm
  • Xbox
  • Xbox 360
  • Xbox One
  • Yahoo
  • Youtube

Blog Archive

  • ▼  2013 (170)
    • ►  September (15)
    • ►  August (13)
    • ►  July (13)
    • ►  June (16)
    • ▼  May (29)
      • Editor's Choice For Best Paid Antivirus Program
      • Editors Choice For Best Free Antivirus Software
      • Bitdefender Free Antivirus Review
      • Trojan.Zbot!gen44
      • Infostealer!gen4
      • Skype Might Not Be That Private
      • Trojan.Blackrev
      • Best Microsoft Office Replacements (Desktop)
      • Trojan.Zbot!gen41
      • Skype Bitcoin Malware
      • Comodo Firewall 6 Review
      • Malware Removal Guide
      • W32.Phopifas!gen2
      • Issues With The American Patent System
      • Packed.Generic.410
      • Malware: WN32.Changeup!gen41
      • Slde Show Images
      • Contact Us
      • Free Daily Software
      • Securing Your Computer For Free Complete Guide
      • Malware: Trojan:Win32/Urausy.D
      • What Is A Trojan:JS/Seedabutor.B
      • What Is RAM?
      • What Is A VPN?
      • Editors Choice Badge
      • Understanding Types Of Hackers
      • Blog Archive
      • List Of Second Opinon Malware Scanners
      • What Is A Second Opinon Malware Scanner?
    • ►  April (28)
    • ►  March (30)
    • ►  February (22)
    • ►  January (4)
Powered by Blogger.

About Me

Unknown
View my complete profile