This Forum has been archived there is no more new posts or threads ... use this link to report any abusive content
==> Report abusive content in this page <==
Post Reply 
 
Thread Rating:
  • 0 Votes - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
What is Cyrp_Yodac? My friend is trying to hack my facebook.?
02-28-2013, 08:11 PM
Post: #3
 
Virus Name :Cryp_Yodac
Named By :Trend Micro
Known Aliases :Trojan.PWS.Spy.9251 (Dr.Web), Trojan-Spy.Win32.Agent.bfev (Kaspersky), TR/Spy.Agent.bfev (Avira), Trojan.Win32.Packer.Yoda1.3 (ep) (SunBelt), Generic.dx!sed (McAfee), Trojan-Spy.Win32.Agent.bfev (VirusBlokAda), Trojan.Generic.3783845 (BitDefender), Trojan:Win32/Comitsproc (Microsoft)
Full ListCharacteristics :(based on aliases)Trojan
Trojan horses may allow a hacker remote access to a target computer system, and perform various operations. The types of operations are limited by user privileges on target computer, which normally includes data theft, modification or deletion of files, keystroke logging, and use of machine as part of a botnet to perform mass spamming or to distribute Denial-of-service attacks.
Trojan horses can be installed through software bundling (included as part of a software application available downloaded from file sharing network), email attachments, instant-messaging network, websites containing executable content (such as ActiveX control), etc. It can also be self-replicated by spreading itself through the use of application exploits.
Trojan-Spy
This type of Trojan secretly installs spy programs and/or keylogger programs. Any password, bank account information, and other sensitive information can be stolen.
Malware designed mainly to steal passwords
This type of Trojan steals passwords and other sensitive information. It may also secretly install other malicious programs, such as keylogger. Stolen logins and passwords can allow an attacker to read user's email, access online banking accounts, etc.
Viruses written for specific platforms
The virus is designed to infect Windows 32-bit executable programs, and works in different Win32-environments.
Compressed "packed" files which contains malware
Being in a packed state reduces the size of the file, and also acts as a form of protection for the malware because its binary data will be altered. A packed file must be decompressed to its original state before it can be executed. Virus writers also commonly use a variety of packing techniques to prevent security programs from analyzing the file, including using multiple packers to compress the file.
Find all posts by this user
Quote this message in a reply
Post Reply 


Messages In This Thread
[] - ProfoundDesperado611 - 02-28-2013, 08:06 PM
[] - Mahi - 02-28-2013 08:11 PM

Forum Jump:


User(s) browsing this thread: 1 Guest(s)