What is Cyrp_Yodac? My friend is trying to hack my facebook.?
|
02-28-2013, 08:11 PM
Post: #3
|
|||
|
|||
Virus Name :Cryp_Yodac
Named By :Trend Micro Known Aliases :Trojan.PWS.Spy.9251 (Dr.Web), Trojan-Spy.Win32.Agent.bfev (Kaspersky), TR/Spy.Agent.bfev (Avira), Trojan.Win32.Packer.Yoda1.3 (ep) (SunBelt), Generic.dx!sed (McAfee), Trojan-Spy.Win32.Agent.bfev (VirusBlokAda), Trojan.Generic.3783845 (BitDefender), Trojan:Win32/Comitsproc (Microsoft) Full ListCharacteristics :(based on aliases)Trojan Trojan horses may allow a hacker remote access to a target computer system, and perform various operations. The types of operations are limited by user privileges on target computer, which normally includes data theft, modification or deletion of files, keystroke logging, and use of machine as part of a botnet to perform mass spamming or to distribute Denial-of-service attacks. Trojan horses can be installed through software bundling (included as part of a software application available downloaded from file sharing network), email attachments, instant-messaging network, websites containing executable content (such as ActiveX control), etc. It can also be self-replicated by spreading itself through the use of application exploits. Trojan-Spy This type of Trojan secretly installs spy programs and/or keylogger programs. Any password, bank account information, and other sensitive information can be stolen. Malware designed mainly to steal passwords This type of Trojan steals passwords and other sensitive information. It may also secretly install other malicious programs, such as keylogger. Stolen logins and passwords can allow an attacker to read user's email, access online banking accounts, etc. Viruses written for specific platforms The virus is designed to infect Windows 32-bit executable programs, and works in different Win32-environments. Compressed "packed" files which contains malware Being in a packed state reduces the size of the file, and also acts as a form of protection for the malware because its binary data will be altered. A packed file must be decompressed to its original state before it can be executed. Virus writers also commonly use a variety of packing techniques to prevent security programs from analyzing the file, including using multiple packers to compress the file. |
|||
« Next Oldest | Next Newest »
|
Messages In This Thread |
What is Cyrp_Yodac? My friend is trying to hack my facebook.? - Dinesh Patel - 02-28-2013, 08:01 PM
[] - ProfoundDesperado611 - 02-28-2013, 08:06 PM
[] - Mahi - 02-28-2013 08:11 PM
|
User(s) browsing this thread: 1 Guest(s)