Saturday, December 13, 2008

CIA Trojan

Removing CIA
Categories: Trojan,Spyware,Backdoor,RAT,Hacker Tool
This loose category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.

Multi-purpose Trojans are also included in this group, as some virus writers
create multi-functional Trojans rather than Trojan packs.
Spyware can even change computer settings, resulting in slow connection speeds,
different home pages, and loss of Internet or other programs.
In an attempt to increase the understanding of spyware, a more formal classification
of its included software types is captured under the term privacy-invasive software.
Backdoors are used by virus writers to detect and download confidential information,
execute malicious code, destroy data, include the machine in bot networks and so forth.

Many trojans and backdoors now have remote administration capabilities
allowing an individual to control the victim's computer.
Many times a file called the server must be opened on the victim's computer before
the trojan can have access to it.

These are generally sent through email, P2P file sharing software,
and in internet downloads. They are usually disguised as a legitimate program or file.
Many server files will display a fake error message when opened, to make it seem like it didn't open.
Some will also kill antivirus and firewall software.
Hacker Tools are designed to penetrate remote computers
in order to use them as zombies or to download other malicious programs to computer.

CIA Also known as:

[Kaspersky]Backdoor.Ciadoor.10.b,Backdoor.Ciadoor.11.a,Backdoor.Ciadoor.11.c,Backdoor.Ciadoor.11.b,Backdoor.Ciadoor.10.a,Backdoor.Ciadoor.121,Backdoor.Win32.Ciadoor.102,Backdoor.Win32.Ciadoor.12.a,Backdoor.Win32.Ciadoor.121,Backdoor.Win32.Ciadoor.a,Backdoor.Win32.Ciadoor.logger;
[Eset]Win32/Ciadoor.11.A trojan,Win32/Ciadoor.11.C trojan,Win32/Ciadoor.121.Logger trojan;
[McAfee]BackDoor-ASB;
[F-Prot]security risk or a "backdoor" program,security risk named W32/CYAdoor.A;
[Panda]Backdoor Program,Bck/Ciadoor,Backdoor Program.LC,Bck/Ciadoor.10,Bck/Ciadoor.B,Bck/Ciadoor.H,Constructor/Ciadoor.A,Trojan Horse;
[Computer Associates]Win32/Ciadoor!Backdoor!EditServe,Win32/Ciadoor.10.b!Backdoor!Serv,Win32.Ciadoor.11,Win32/Ciadoor.11!Backdoor!Server,Win32.Ciadoor.11.B,Win32/Ciadoor.11.B!Backdoor!Serv,Win32/Ciadoor.11.b!Backdoor!Serv,Win32.Ciadoor.1,Win32/Ciadoor.10!Backdoor!Server,PHP/Ciadoor!Trojan,Win32.Ciadoor.121.A,Win32.Ciadoor.121.A.plugin,Win32/Ciadoor.121.A!Backdoor!Ser,Win32/Ciadoor.121.A!Config

Visible Symptoms:
Files in system folders:
[%WINDOWS%]\system\okl.okl
[%WINDOWS%]\system\okl445.dat
[%WINDOWS%]\system\okl.okl
[%WINDOWS%]\system\okl445.dat

How to detect CIA:

Files:
[%WINDOWS%]\system\okl.okl
[%WINDOWS%]\system\okl445.dat
[%WINDOWS%]\system\okl.okl
[%WINDOWS%]\system\okl445.dat

Registry Values:
HKEY_CURRENT_USER\software\microsoft\windows nt\currentversion\windows\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run

Removing CIA:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
Removing Bifrost Trojan
Removing SuperMM Backdoor
Pigeon.DZT Trojan Cleaner
Vxidl.ACW Trojan Removal instruction
Ramzdor Backdoor Symptoms

No comments: