Phishing Scams - Fraudulent Sites - Trojan Attacks
Trojans I recently encountered, no matter your Operating System, Security Protection Level & if both are updated,
including Browsers used...every Computer is Susceptible to Attacks. Luckily Norton Blocked such Attacks.
The following information is brief expressing the potential of compromising your Computer
Trojan.Ransomlock
Trojan.Ransomlock is a detection for Trojan horse programs that lock the
desktop of a compromised computer making it unusable.
The threat may arrive on the compromised computer by various means, such as
visiting malicious sites, by opening un-trusted
links or advertisement banners,
or by installing software from un-trusted sources.
Various functions on the compromised computer are modified, ranging from
inhibiting access to the task manager to
altering the master boot record (MBR)
so that the operating system cannot be executed.
These programs attempt to convince the user to pay money in order to have their
computer unlocked and use a variety of
different techniques in order to encourage the user to pay the ransom.
Trojan.Malscript!html
Trojan.Malscript!html is a detection name used by Symantec to identify HTML
files that contain malicious JavaScript.
HTML files may contain malicious content for a number of reasons. The
files may have been specially crafted to be
intrinsically malicious, or they may be legitimate HTML files that have been infected by threats such as W32.Ramnit or
W32.Fujacks.CE. The files may be downloaded on to the computer during Web browsing, by other malware, inside archive files,
and through various other
methods.
With the Web browser now used for online shopping, banking, social networking,
and entertainment, it has become one of the
most popular targets for attackers.
The attack surface is large, with third-party plugins and extensions that extend browser capabilities also being vulnerable to attack.
Browser compromise can therefore be the cause of some of the most significant security breaches and hence can cause a great
deal of harm to compromised computers and the victims of
the attacks.
Authors of malicious JavaScript may go to lengths to ensure that their code is
obfuscated so that its functionality is hidden from
casual observers and to complicate the task of analysis. Obfuscation may also be used in an attempt to create code that is able
to circumvent security software.
When injected into an HTML file, malicious JavaScript can:
Exploit browser and plugin vulnerabilities to run arbitrary code
Display fake antivirus scans and other fraudulent information
Download JavaScript, HTML, and other files
Hijack browsing sessions
Redirect users to malicious websites
Steal information
If a Symantec antivirus product displays a detection alert for this threat, it
means the computer is already protected and the
Symantec product will effectively remove this threat from the computer.
Phishing Scams - Fraudulent Sites - Trojan Attacks
< For more Information or Questions, over 30 years experience |