Check Point Reference: | CPAI-2009-161 |
Date Published: | 19 Aug 2009 |
Severity: | High |
Last Updated: | Thursday 01 January, 2009 |
Source: | Backdoor Trojan: Backdoor.Win32.Prorat.K Backdoor Trojan: Backdoor.Win32.SpyAgent.B Rogue-Software: XP-Shield Trickler: Trojan-Downloader.Win32.Delf.tbv Trickler: Trojan.Downloader.Win32.Agent.bkwx Trojan: PWS-QQGame Trojan: PWS.Win32.Zbot.PJ Trojan: Trojan.Win32.Agent.chgp Trojan: Trojan.Win32.Buzus.AWGQ Trojan: Trojan.Win32.Crypt.vb Worm: Worm.Win32.AutoRun.aw Worm: Worm.Win32.Sohanad.bm |
Protection Provided by: | |
Who is Vulnerable? | Microsoft Windows clients |
Vulnerability Description | The update includes new protections against 12 recent malware threats: Backdoor Trojan: Backdoor.Win32.Prorat.K Backdoor Trojan: Backdoor.Win32.SpyAgent.B Rogue-Software: XP-Shield Trickler: Trojan-Downloader.Win32.Delf.tbv Trickler: Trojan.Downloader.Win32.Agent.bkwx Trojan: PWS-QQGame Trojan: PWS.Win32.Zbot.PJ Trojan: Trojan.Win32.Agent.chgp Trojan: Trojan.Win32.Buzus.AWGQ Trojan: Trojan.Win32.Crypt.vb Worm: Worm.Win32.AutoRun.aw Worm: Worm.Win32.Sohanad.bm |
Vulnerability Details | Malware is a software designed to infiltrate or damage a computer system without the owner's informed consent. It is a general name for a variety of forms of hostile, intrusive, or annoying programs like Viruses, worms, Adware, Trojans, and spyware that exploit unprotected clients, using network access to intrude upon organizations, destroying or stealing data.
Rogue Software is a software that uses Malware or malicious tools to advertise or install itself or to force computer users to pay for removal of nonexistent malware. Rogue software will often install a trojan horse to download a trial version, or it will execute other unwanted actions. A Trojan horse is a program that installs malicious software while under the guise of doing something else. Trojans are known for installing backdoor programs which allow unauthorized non permissible remote access to the victim's machine by unwanted parties with malicious intentions. Worms are malicious programs that spread themselves without any user intervention and have a self-replicating behavior. A Worm may consume a large amount of system resources and cause the machine to become unreliable. Moreover, some Worms may be used to compromise infected machines and download additional malicious software. |