Check Point Advisories

Update Protections against Recent Malware Threats (22-Mar-09)

Check Point Reference: CPAI-2009-042
Date Published: 22 Mar 2009
Severity: High
Last Updated: Thursday 01 January, 2009
Source: iWonBar
Trojan-Downloader.Win32.Delf.phh
Protection Provided by:
Who is Vulnerable? Microsoft Windows clients
Vulnerability Description The update includes new protections against 2 recent malware threats:

iWonBar - iWonBar is a toolbar the hijacks the browser. It alters the Internet Explorer settings unexpectedly, tracks the user web activities and hijacks the user searches to its controlling server.

Trojan-Downloader.Win32.Delf.phh - Trojan-Downloader.Win32.Delf.phh is an application that requests and downloads files and malware binaries to the user's computer. It also creates start-up registry entries on the victim's host.

Vulnerability DetailsMalware is a software designed to infiltrate or damage a computer system without the owner's informed consent. It is a general name for a variety of forms of hostile, intrusive, or annoying programs like Viruses, worms, Adware, Trojans, and spyware that exploit unprotected clients, using network access to intrude upon organizations, destroying or stealing data.

Spyware is computer software that is installed without the user's informed consent on a personal computer to intercept or take partial control over the user's interaction with the computer. Spyware programs can collect various types of personal information, install additional software, redirect Web browser activity, or divert advertising revenue to a third party.

Adware is an advertising-supported software package which automatically plays, displays, or downloads advertising material to a computer after the software is installed on it or while the application is being used.

A Trojan horse is a program that installs malicious software while under the guise of doing something else.  Trojans are known for installing backdoor programs which allow unauthorized non permissible remote access to the victim's machine by unwanted parties with malicious intentions.

Protection Overview

×
  Feedback
This website uses cookies for its functionality and for analytics and marketing purposes. By continuing to use this website, you agree to the use of cookies. For more information, please read our Cookies Notice.
OK