Subscribe to Malware Help RSS Feed RSS Feed - Subscribe to Malware Help. Org on Twitter Follow on Twitter - Malware Help YouTube Channel YouTube Channel - Subscribe to Malware Help by Email Subscribe by Email

trojan

Find and Remove SpyEye Banking Trojan

by Shanmuga
Thumbnail image for Find and Remove SpyEye Banking Trojan

SpyEye banking trojan first made its appearance about a year back as a competitor to what is till then known as the king of all bots Zeus/Zbot. Security researchers believe that both bots have now joined hands to prey upon online banking users world-wide.

Read the full article →

Cannot run any programs after removing XP Guardian (TrojanWin32 FakeRean)

by Shanmuga

I used Microsoft Security Essentials to get rid of XP Guardian virus from my computer. Since then I am unable to run any .exe programs, Please help. Matt by email XP Guardian belongs to the family of Trojan:Win32/FakeRean. According to Microsoft the latest version “now uses individual names and looks for Windows XP, Windows Vista

Read the full article →

Browsing malicious websites

by Shanmuga

"Kaspersky Lab announces the publication of the analytical article “Browsing malicious websites” by Costin Raiu, Kaspersky Lab’s leading security expert in the EEMEA region. The article provides an overview of the threats a user may encounter when visiting seemingly safe Internet sites. The author examines what drives the cybercriminals and how they use websites to

Read the full article →

Find and Remove Zeus (Zbot) Banking Trojan

by Shanmuga

According to Trusteer a security company, “Zeus is the #1 botnet, with 3.6 million PCs infected in the US alone (i.e. approximately 1% of the PCs in the US)…Zeus is a financial malware. It infects consumer PCs, waits for them to log onto a list of targeted banks and financial institutions, and then steals their

Read the full article →

Why virus writers are turning to open source

by Shanmuga

"Malware developers are going open source in an effort to make their malicious software more useful to fraudsters. By giving criminal coders free access to malware that steals financial and personal details, the malicious software developers are hoping to expand the capabilities of old Trojans.

Read the full article →

Do I own my machine?

by Shanmuga

"The built-in Webcam light is on. It shouldn’t be on. I’m not using any recording, video-conferencing or photo applications. Why is it on? Is someone watching me? It’s at times like this I get the eerie feeling that I don’t actually, fully and completely own my machine. Turns out it was a driver problem, all

Read the full article →

Russian Hacker leaves message for Microsoft in Trojan code

by Shanmuga

"Here’s a new way to get Microsoft to pay attention to you: Slip a brief message into the malicious Trojan horse program you just wrote. That’s what an unnamed Russian hacker did recently with a variation of Win32/Zlob, a Trojan program victims are being tricked into installing on their computers.

Read the full article →

OSX.Lamzev.A – An OS X malware

by Shanmuga

A new trojan for the OS X has been discovered. When the Trojan is executed, it creates the following file: /Applications/ezmal

Read the full article →

Celebrity Malicious Spam Analysis and Removal

by Shanmuga

Recently my inbox was filled with spam containing subject lines "Re: Offical Update 2008" and number of catchy celebrity themed storm worm lines… I opened one of the spam mail with the paris hilton subject line and clicked on the single link which promised to let me view a previously unseen video of the celebrity.

Read the full article →

Trend Micro website infected users with Trojan

by Shanmuga

"Antivirus vendor Trend Micro Inc. confirmed Thursday that "some portions" of its site had been hacked earlier this week, but hedged when asked if those pages had been serving up attack code to unsuspecting visitors.

Read the full article →

Malicious Code: Trojan.Silentbanker

by Shanmuga

"The scale and sophistication of this emerging banking Trojan is worrying, even for someone who sees banking Trojans on a daily basis. This Trojan downloads a configuration file that contains the domain names of over 400 banks. Not only are the usual large American banks targeted but banks in many other countries are also targeted,

Read the full article →

Malware: How Antivirus Programs (Don’t) Work

by Shanmuga

"For over 25 years, the computer community has been dealing with malicious software. These little pieces of malware started as minor pranks and theoretical explorations into subverting security controls, but soon developed into more malicious programs that have left a significant impact on the computing community. Over the last decade we have seen viruses/Trojans/worms wreck

Read the full article →

Malware: Hackers exploit Bhutto assassination

by Shanmuga

"Searches for news about Bhutto’s killing and the ensuing chaos in Pakistan listed sites pimping a bogus video coder/decoder (codec), said analysts at McAfee Inc., Symantec Corp. and WebSense Inc. For instance, WebSense found such a site simply by using "benazir" to search on Google. Meanwhile, McAfee quickly located 10 sites hosted on Blogger.com, Google

Read the full article →