Check Point Reference: | CPAI-2009-177 |
Date Published: | 1 Sep 2009 |
Severity: | High |
Last Updated: | Thursday 01 January, 2009 |
Source: | Backdoor-Trojan: Backdoor.Win32.Dreamy.bc Trickler: Trojan-Dropper.Win32.Agent.aqpn Trickler: Trojan-Downloader.Win32.Banload.bvk Trojan: Sus.BancDl-B Trojan: Trojan-Spy.Win32.VB.btm Trojan: Trojan-Downloader.Win32.VB.nec Trojan: Trojan-Spy.Win32.PerfectKeylogger Trojan: Trojan.Downloader.Win32.Cutwail.AI Trojan: Trojan-Downloader.Win32.FraudLoad.eys |
Protection Provided by: | |
Who is Vulnerable? | Microsoft Windows clients |
Vulnerability Description | The update includes new protections against 9 recent malware threats: Backdoor-Trojan: Backdoor.Win32.Dreamy.bc Trickler: Trojan-Dropper.Win32.Agent.aqpn Trickler: Trojan-Downloader.Win32.Banload.bvk Trojan: Sus.BancDl-B Trojan: Trojan-Spy.Win32.VB.btm Trojan: Trojan-Downloader.Win32.VB.nec Trojan: Trojan-Spy.Win32.PerfectKeylogger Trojan: Trojan.Downloader.Win32.Cutwail.AI Trojan: Trojan-Downloader.Win32.FraudLoad.eys |
Vulnerability Details | Malware is a software designed to infiltrate or damage a computer system without the owner's informed consent. It is a general name for a variety of forms of hostile, intrusive, or annoying programs like Viruses, worms, Adware, Trojans, and spyware that exploit unprotected clients, using network access to intrude upon organizations, destroying or stealing data. A Backdoor Trojan is a malicious application that opens a backdoor to a system. A backdoor is a method of bypassing normal authentication, securing remote access to a computer, obtaining access to plaintext, and so on, while attempting to remain undetected. The backdoor may take the form of an installed program or could be a modification to an existing program. A Trojan horse is a program that installs malicious software while under the guise of doing something else. Trojans are known for installing backdoor programs which allow unauthorized non permissible remote access to the victim's machine by unwanted parties with malicious intentions. |