Phishing Scams - Fraudulent Sites - Trojan Attacks

 

 

Trojans I recently encountered, no matter your Operating System, Security Protection Level & if both are updated,

including Browsers used...every Computer is Susceptible to Attacks.  Luckily Norton Blocked such Attacks. 

The following information is brief expressing the potential of compromising your Computer

 

 

Trojan.Ransomlock

 

Trojan.Ransomlock is a detection for Trojan horse programs that lock the desktop of a compromised computer making it unusable.

The threat may arrive on the compromised computer by various means, such as visiting malicious sites, by opening un-trusted

links or advertisement banners, or by installing software from un-trusted sources.

Various functions on the compromised computer are modified, ranging from inhibiting access to the task manager to

altering the master boot record (MBR) so that the operating system cannot be executed.

These programs attempt to convince the user to pay money in order to have their computer unlocked and use a variety of

different techniques in order to encourage the user to pay the ransom.

 

 

Trojan.Malscript!html

 

Trojan.Malscript!html is a detection name used by Symantec to identify HTML files that contain malicious JavaScript.

HTML files may contain malicious content for a number of reasons.  The files may have been specially crafted to be

intrinsically malicious, or they may be legitimate HTML files that have been infected by threats such as W32.Ramnit or

W32.Fujacks.CE.  The files may be downloaded on to the computer during Web browsing, by other malware, inside archive files,

and through various other methods.

With the Web browser now used for online shopping, banking, social networking, and entertainment, it has become one of the

most popular targets for attackers. 

 

The attack surface is large, with third-party plugins and extensions that extend browser capabilities also being vulnerable to attack. 

 

Browser compromise can therefore be the cause of some of the most significant security breaches and hence can cause a great

deal of harm to compromised computers and the victims of the attacks.

Authors of malicious JavaScript may go to lengths to ensure that their code is obfuscated so that its functionality is hidden from

casual observers and to complicate the task of analysis.  Obfuscation may also be used in an attempt to create code that is able

to circumvent security software.

When injected into an HTML file, malicious JavaScript can:

Exploit browser and plugin vulnerabilities to run arbitrary code
Display fake antivirus scans and other fraudulent information
Download JavaScript, HTML, and other files
Hijack browsing sessions
Redirect users to malicious websites
Steal information

If a Symantec antivirus product displays a detection alert for this threat, it means the computer is already protected and the

Symantec product will effectively remove this threat from the computer.

 

Phishing Scams - Fraudulent Sites - Trojan Attacks

 

Computer First Aid Services - Your PC's 911 Service

< For more Information or Questions,

over 30 years experience