Check Point Reference: | CPAI-2009-196 |
Date Published: | 4 Oct 2009 |
Severity: | High |
Last Updated: | Thursday 01 January, 2009 |
Source: | Backdoor: Trojan.Win32.StartPage Rogue-Software: 007 Anti-Spyware Rogue-Software: Fast Antivirus 2009 Rogue-Software: PC AntiSpyware 2010 Rogue-Software: Personal Antivirus Rogue-Software: Rogue-Software.AVCare Rogue-Software: Smart Protector Rogue-Software: WinSpywareProtect Trickler: Trojan-Downloader.Win32.VB.pnc Trojan: Backdoor.Win32.UltimateDefender.xv Trojan: BrowserModifier.Win32.Kerlofost Trojan: Packed.Win32.Klone.bj Trojan: Packed.Win32.Krap.i Trojan: Trojan-Banker.Win32.Banbra.mcq Trojan: Trojan-Banker.Win32.Bancos.etf Trojan: Trojan-Downloader.Win32.Banload.agcw Trojan: Trojan-Downloader.Win32.Malushka.T Trojan: Trojan-Mailfinder.Win32.Mailbot.dz Trojan: Trojan.Win32.Pasta.aoq Worm: W32.Fujacks.CA |
Protection Provided by: | |
Who is Vulnerable? | Microsoft Windows clients |
Vulnerability Description | The update includes new protections against 20 recent malware threats: Backdoor: Trojan.Win32.StartPage Rogue-Software: 007 Anti-Spyware Rogue-Software: Fast Antivirus 2009 Rogue-Software: PC AntiSpyware 2010 Rogue-Software: Personal Antivirus Rogue-Software: Rogue-Software.AVCare Rogue-Software: Smart Protector Rogue-Software: WinSpywareProtect Trickler: Trojan-Downloader.Win32.VB.pnc Trojan: Backdoor.Win32.UltimateDefender.xv Trojan: BrowserModifier.Win32.Kerlofost Trojan: Packed.Win32.Klone.bj Trojan: Packed.Win32.Krap.i Trojan: Trojan-Banker.Win32.Banbra.mcq Trojan: Trojan-Banker.Win32.Bancos.etf Trojan: Trojan-Downloader.Win32.Banload.agcw Trojan: Trojan-Downloader.Win32.Malushka.T Trojan: Trojan-Mailfinder.Win32.Mailbot.dz Trojan: Trojan.Win32.Pasta.aoq Worm: W32.Fujacks.CA |
Vulnerability Details | Malware is a software designed to infiltrate or damage a computer system without the owner's informed consent. It is a general name for a variety of forms of hostile, intrusive, or annoying programs like Viruses, worms, Adware, Trojans, and spyware that exploit unprotected clients, using network access to intrude upon organizations, destroying or stealing data. A Backdoor Trojan is a malicious application that opens a backdoor to a system. A backdoor is a method of bypassing normal authentication, securing remote access to a computer, obtaining access to plaintext, and so on, while attempting to remain undetected. The backdoor may take the form of an installed program or could be a modification to an existing program. A Trojan horse is a program that installs malicious software while under the guise of doing something else. Trojans are known for installing backdoor programs which allow unauthorized non permissible remote access to the victim's machine by unwanted parties with malicious intentions. |