Categories: BHO,Hijacker,Toolbar
BHO (Browser Helper Object) Trojan.
The BHO waits for the user to post personal information to a monitored website.
As this information is entered by the user, it is captured by the BHO and sent back to the attacker.
The method of network transport used by the attacker makes this Trojan unique.
Typically, keyloggers of this type will send the stolen information back to the attacker via email
or HTTP POST, which can appear suspicious.
Instead, this Trojan encodes the data with a simple XOR algorithm before placing it into
the data section of an ICMP ping packet." explained the company.
Hijackers take control of various parts of your web browser, including your home page,
search pages, and search bar. They may also redirect you to certain sites should you
mistype an address or prevent you from going to a website they would rather you not,
such as sites that combat malware. Some will even redirect you to their own search engine
when you attempt a search.
Toolbar presents itself as a helpful add-on for Internet Explorer but it is a real pest.
It replaces your start page, continuosly open a number of pop up windows and so on.
Visible Symptoms:
Files in system folders:
[%WINDOWS%]\system\ttbbho.dll
[%WINDOWS%]\system\ttbbho.dll
How to detect Comodo.Trust:
Files:
[%WINDOWS%]\system\ttbbho.dll
[%WINDOWS%]\system\ttbbho.dll
Registry Keys:
HKEY_CLASSES_ROOT\clsid\{093caf40-3ba6-4071-a050-e830cbdc6480}
HKEY_CLASSES_ROOT\clsid\{d80e1356-ac78-4218-961c-a7689b4cb7fe}
HKEY_CLASSES_ROOT\software\microsoft\windows\currentversion\explorer\browser helper objects\{d80e1356-ac78-4218-961c-a7689b4cb7fe}
HKEY_LOCAL_MACHINE\software\classes\clsid\{d80e1356-ac78-4218-961c-a7689b4cb7fe}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{d80e1356-ac78-4218-961c-a7689b4cb7fe}
Removing Comodo.Trust:
You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.
Or buy it to remove ALL viruses from your computer.Also Be Aware of the Following Threats:
No comments:
Post a Comment