Check Point Reference: | CPAI-2009-262 |
Date Published: | 21 Oct 2009 |
Severity: | High |
Last Updated: | Thursday 01 January, 2009 |
Source: | Backdoor: Teevsock C Rogue-Software: Antivirus Pro 2010 Rogue-Software: NoAdware Rogue-Software: Trust Warrior Trickler: Trojan-Downloader.Win32.Agent.cqcv Trickler: TrojanDownloader.Win32.Caxnet.A Trickler: TrojanDownloader.Win32.Wixud.B Trickler: TrojanDropper.Win32.Dogrobot.E Trojan: Email-Worm.Win32.Zhelatin.ch Trojan: Trojan.BAT.Shutdown.ef Trojan: Trojan.Win32.VB.ktq |
Protection Provided by: | |
Who is Vulnerable? | Microsoft Windows clients |
Vulnerability Description | The update includes new protections against 11 recent malware threats: Backdoor: Teevsock C Rogue-Software: Antivirus Pro 2010 Rogue-Software: NoAdware Rogue-Software: Trust Warrior Trickler: Trojan-Downloader.Win32.Agent.cqcv Trickler: TrojanDownloader.Win32.Caxnet.A Trickler: TrojanDownloader.Win32.Wixud.B Trickler: TrojanDropper.Win32.Dogrobot.E Trojan: Email-Worm.Win32.Zhelatin.ch Trojan: Trojan.BAT.Shutdown.ef Trojan: Trojan.Win32.VB.ktq |
Vulnerability Details | Malware is a software designed to infiltrate or damage a computer system without the owner's informed consent. It is a general name for a variety of forms of hostile, intrusive, or annoying programs like Viruses, worms, Adware, Trojans, and spyware that exploit unprotected clients, using network access to intrude upon organizations, destroying or stealing data.
A Backdoor Trojan is a malicious application that opens a backdoor to a system. A backdoor is a method of bypassing normal authentication, securing remote access to a computer, obtaining access to plaintext, and so on, while attempting to remain undetected. The backdoor may take the form of an installed program or could be a modification to an existing program. Tricklers are software designed to download and install malicious applications by running silently in the background to be less noticeable. Tricklers are typically used to install a spyware programs onto the victim's machine. A Trojan horse is a program that installs malicious software while under the guise of doing something else. Trojans are known for installing backdoor programs which allow unauthorized non permissible remote access to the victim's machine by unwanted parties with malicious intentions. Rogue Software is a software that uses Malware or malicious tools to advertise or install itself or to force computer users to pay for removal of nonexistent malware. Rogue software will often install a trojan horse to download a trial version, or it will execute other unwanted actions. |