Check Point Reference: | CPAI-2010-085 |
Date Published: | 26 May 2010 |
Severity: | High |
Last Updated: | Friday 01 January, 2010 |
Source: | Check Point Malware Research Team |
Protection Provided by: | |
Who is Vulnerable? | Microsoft Windows clients |
Vulnerability Description | Malware is a software designed to infiltrate or damage a computer system without the owner's informed consent. It is a general name for a variety of forms of hostile, intrusive, or annoying programs like Viruses, worms, Adware, Trojans, and spyware that exploit unprotected clients, using network access to intrude upon organizations, destroying or stealing data.
A Trojan horse is a program that installs malicious software while under the guise of doing something else. Trojans are known for installing backdoor programs which allow unauthorized non permissible remote access to the victim's machine by unwanted parties with malicious intentions. |
Vulnerability Details | Trojan.Sasfis is a Trojan Dropper that is being distributed via spam E-mail. |