Check Point Reference: | CPAI-2009-098 |
Date Published: | 28 Apr 2009 |
Severity: | High |
Last Updated: | Thursday 01 January, 2009 |
Source: | Trojan-Dropper: IRC.TKB Backdoor: Trojan.TDSS.1.Gen Trojan-Downloader: Trojan-Spy.Win32.Pophot Password Stealer: 0desa Msn Pass Stealer 8.5 |
Protection Provided by: | |
Who is Vulnerable? | Microsoft Windows clients |
Vulnerability Description | The update includes new protections against 4 recent malware threats: Trojan-Dropper: IRC.TKB - Trojan-Dropper IRC.TKB is an application that installs malicious files and downloads unwanted content to user's host without user's consent. Backdoor: Trojan.TDSS.1.Gen - Trojan.TDSS.1.Gen is a backdoor Trojan application that downloads and installs TDSServ rootkit on user's host. Trojan-Downloader: Trojan-Spy.Win32.Pophot - Trojan-Spy.Win32.Pophot is a Trojan downloader that installs other malicious code and files into the infected system. It attempts to steal passwords, login details and other confidential information and sends such information to its remote host. Password Stealer: 0desa Msn Pass Stealer 8.5 - 0desa Msn Pass Stealer 8.5 is an Hacker-Tool password stealer that captures victim's MSN login password and sends it to an predefined email address. |
Vulnerability Details | Malware is a software designed to infiltrate or damage a computer system without the owner's informed consent. It is a general name for a variety of forms of hostile, intrusive, or annoying programs like Viruses, worms, Adware, Trojans, and spyware that exploit unprotected clients, using network access to intrude upon organizations, destroying or stealing data. Spyware is computer software that is installed without the user's informed consent on a personal computer to intercept or take partial control over the user's interaction with the computer. Spyware programs can collect various types of personal information, install additional software, redirect Web browser activity, or divert advertising revenue to a third party. Adware is an advertising-supported software package which automatically plays, displays, or downloads advertising material to a computer after the software is installed on it or while the application is being used. A Trojan horse is a program that installs malicious software while under the guise of doing something else. Trojans are known for installing backdoor programs which allow unauthorized non permissible remote access to the victim's machine by unwanted parties with malicious intentions. |