Check Point Advisories

Update Protection against Recent Malware Threats (4-Oct-09)

Check Point Reference: CPAI-2009-196
Date Published: 4 Oct 2009
Severity: High
Last Updated: Thursday 01 January, 2009
Source: Backdoor: Trojan.Win32.StartPage
Rogue-Software: 007 Anti-Spyware
Rogue-Software: Fast Antivirus 2009
Rogue-Software: PC AntiSpyware 2010
Rogue-Software: Personal Antivirus
Rogue-Software: Rogue-Software.AVCare
Rogue-Software: Smart Protector
Rogue-Software: WinSpywareProtect
Trickler: Trojan-Downloader.Win32.VB.pnc
Trojan: Backdoor.Win32.UltimateDefender.xv
Trojan: BrowserModifier.Win32.Kerlofost
Trojan: Packed.Win32.Klone.bj
Trojan: Packed.Win32.Krap.i
Trojan: Trojan-Banker.Win32.Banbra.mcq
Trojan: Trojan-Banker.Win32.Bancos.etf
Trojan: Trojan-Downloader.Win32.Banload.agcw
Trojan: Trojan-Downloader.Win32.Malushka.T
Trojan: Trojan-Mailfinder.Win32.Mailbot.dz
Trojan: Trojan.Win32.Pasta.aoq
Worm: W32.Fujacks.CA
Protection Provided by:
Who is Vulnerable? Microsoft Windows clients
Vulnerability Description The update includes new protections against 20 recent malware threats:

Backdoor: Trojan.Win32.StartPage
Rogue-Software: 007 Anti-Spyware
Rogue-Software: Fast Antivirus 2009
Rogue-Software: PC AntiSpyware 2010
Rogue-Software: Personal Antivirus
Rogue-Software: Rogue-Software.AVCare
Rogue-Software: Smart Protector
Rogue-Software: WinSpywareProtect
Trickler: Trojan-Downloader.Win32.VB.pnc
Trojan: Backdoor.Win32.UltimateDefender.xv
Trojan: BrowserModifier.Win32.Kerlofost
Trojan: Packed.Win32.Klone.bj
Trojan: Packed.Win32.Krap.i
Trojan: Trojan-Banker.Win32.Banbra.mcq
Trojan: Trojan-Banker.Win32.Bancos.etf
Trojan: Trojan-Downloader.Win32.Banload.agcw
Trojan: Trojan-Downloader.Win32.Malushka.T
Trojan: Trojan-Mailfinder.Win32.Mailbot.dz
Trojan: Trojan.Win32.Pasta.aoq
Worm: W32.Fujacks.CA
Vulnerability DetailsMalware is a software designed to infiltrate or damage a computer system without the owner's informed consent. It is a general name for a variety of forms of hostile, intrusive, or annoying programs like Viruses, worms, Adware, Trojans, and spyware that exploit unprotected clients, using network access to intrude upon organizations, destroying or stealing data.

A Backdoor Trojan is a malicious application that opens a backdoor to a system.  A backdoor is a method of bypassing normal authentication, securing remote access to a computer, obtaining access to plaintext, and so on, while attempting to remain undetected. The backdoor may take the form of an installed program or could be a modification to an existing program.

Tricklers are software designed to download and install malicious applications by running silently in the background to be less noticeable. Tricklers are typically used to install a spyware programs onto the victim's machine.

A Trojan horse is a program that installs malicious software while under the guise of doing something else.  Trojans are known for installing backdoor programs which allow unauthorized non permissible remote access to the victim's machine by unwanted parties with malicious intentions.

Worms are malicious programs that spread themselves without any user intervention and have a self-replicating behavior. A Worm may consume a large amount of system resources and cause the machine to become unreliable. Moreover, some Worms may be used to compromise infected machines and download additional malicious software.

Protection Overview

×
  Feedback
This website uses cookies for its functionality and for analytics and marketing purposes. By continuing to use this website, you agree to the use of cookies. For more information, please read our Cookies Notice.
OK