Security Hero Rotating Header Image

Spyware

President Obama address nation on cyber security

President Obama address nation on cyber security

Within the past hour, President Obama addressed the nation from the White House to emphasize the importance of cyber security, to announce the release of the administration’s report of its 60-day cyberspace policy review, and to announce the creation of a new White House position, the Coordinator of National Cyber Security.

This represents an enormous step forward in national awareness of the role cyber security in general and malware in particular play in our economy and our physical security. Having the "leader of the free world" describe the threat of botnets and spyware on national television will expand press and citizen interest in this issue.

As important as the threats, though, are the freedoms that the President discussed. He emphasized the importance of preserving both personal privacy and net neutrality while securing our infrastructure. He also pointed out that this will require a collaborative effort amongst individuals, schools, corporations, and governments from the local level through the national level, not just in the U.S., but internationally, as well.

The attention is an important start, but of course execution is the key. Melissa Hathaway, Cybersecurity Chief at the National Security Council, posted some information about the policy review she led, as well as links to the report (PDF) and to the papers that informed the report. Based on a preview of the report that Melissa Hathaway delivered at the Kennedy School last night, I expect the administration is moving in the right direction. I look forward to reading the report, and I encourage others to do so, as well. Meanwhile, it’s up to all of us to work together to build a safer Internet. StopBadware looks forward to playing a role in bringing together the people, the organizations, and the data that make this possible.

URL: http://blog.stopbadware.org/2009/05/29/president-obama-address-nation-on-cyber-security

4116

4116

BAT/Qhost.NBP (2), INF/Autorun (3), PDF/Exploit.Pidief.ONM, PDF/Exploit.Pidief.ONN (2), PDF/Exploit.Pidief.ONO, PDF/Exploit.Pidief.ONP (2), Win32/Adware.BHO.NCX, Win32/Adware.Coolezweb (4), Win32/Adware.InternetAntivirus, Win32/Adware.PersonalAntivirus, Win32/Adware.SpywareRemover, Win32/Adware.SystemSecurity (18), Win32/Agent.PMR (2), Win32/Agent.WPI, Win32/AntiAV.AZQ, Win32/AntiAV.NAO (2), Win32/AutoRun.ABH, Win32/AutoRun.ADR (2), Win32/AutoRun.FakeAlert.BR, Win32/AutoRun.FakeAlert.M, Win32/AutoRun.VB.CN (2), Win32/Bagle.RG, Win32/Delf.NSQ (3), Win32/Dialer.NHQ (3), Win32/Dialer.NHR (3), Win32/FlyStudio.NMJ, Win32/FlyStudio.NMK, Win32/Hupigon.NPD, Win32/Injector.PK, Win32/IRCBot.ADZ, Win32/Koobface.NBG (2), Win32/Koutodoor.AB, Win32/Koutodoor.AD, Win32/Koutodoor.AE (4), Win32/Koutodoor.G, Win32/Kryptik.QY, Win32/Olmarik.GW (2), Win32/Olmarik.HG (4), Win32/Olmarik.IB, Win32/Peerfrag.BA, Win32/Peerfrag.BG, Win32/Peerfrag.BH, Win32/Popwin.NBJ (2), Win32/PSW.OnLineGames.NMP, Win32/PSW.OnLineGames.NMY, Win32/PSW.OnLineGames.OKC, Win32/PSW.Small.NBE (4), Win32/Qhost, Win32/Qhost.NIJ (2), Win32/Rootkit.Agent.KZU, Win32/Rootkit.Ressdt.NBS, Win32/Spy.Banker.QRW (2), Win32/Spy.Banker.QYO (3), Win32/Spy.Banker.QZB (2), Win32/Spy.Banker.QZC (2), Win32/Spy.Goldun.NFA, Win32/Spy.Zbot.JF (3), Win32/Spy.Zbot.PG (2), Win32/Spy.Zbot.RD, Win32/Spy.Zbot.RN, Win32/Tifaut.C (4), Win32/TrojanDownloader.Agent.PCZ, Win32/TrojanDownloader.Agent.PDA, Win32/TrojanDownloader.Agent.PDB, Win32/TrojanDownloader.Agent.PDC, Win32/TrojanDownloader.Agent.PDD, Win32/TrojanDownloader.Bagle.NBJ, Win32/TrojanDownloader.Bredolab.AB, Win32/TrojanDownloader.FakeAlert.AAX, Win32/TrojanDownloader.FakeAlert.ABV, Win32/TrojanDownloader.Small.OPS (2), Win32/TrojanDownloader.Zlob.CZK, Win32/VB.NHD, Win32/VB.OEY (2), Win32/Wigon.KX

URL: http://www.eset.com/joomla/index.php?option=com_content&task=view&id=6085&Itemid=26

4108

4108

IRC/SdBot (2), SWF/Exploit.Agent.AB (2), Win32/Adware.Antivirus2008, Win32/Adware.BHO.NCX, Win32/Adware.SpywareProtect2009 (2), Win32/Adware.XPGuard, Win32/Agent.PIS, Win32/Agent.PIX, Win32/AutoRun.Agent.IE (3), Win32/AutoRun.FlyStudio.KB, Win32/AutoRun.VB.CD, Win32/Delf.NHH, Win32/Injector.MB, Win32/Injector.MC, Win32/Injector.MD, Win32/Injector.NV, Win32/IRCBot.ADZ, Win32/Koutodoor.AB (4), Win32/Koutodoor.G, Win32/Kryptik.QN, Win32/Lanc.A, Win32/Pacex.Gen (2), Win32/PSW.OnLineGames.OIX, Win32/PSW.YahooPass.NAD, Win32/StartPage.BR, Win32/TrojanClicker.Agent.NGS (2), Win32/TrojanDownloader.Agent.OXU, Win32/TrojanDownloader.Agent.OYU, Win32/TrojanDownloader.Banload.OOC, Win32/TrojanDownloader.Banload.OOP, Win32/TrojanDownloader.Bredolab.AA (2), Win32/TrojanDownloader.Delf.ORH, Win32/TrojanDownloader.Small.OKW (2), Win32/TrojanDownloader.VB.NWO, Win32/TrojanDownloader.Zlob.CZK, Win32/TrojanDropper.Agent.NSS, Win32/TrojanProxy.Small.NCA, Win32/Wigon.KU

URL: http://www.eset.com/joomla/index.php?option=com_content&task=view&id=6077&Itemid=26

4105

4105

BAT/TrojanDownloader.Ftp.NDK, BAT/TrojanDownloader.Ftp.NDL, PDF/Exploit.Pidief.OND, PDF/Exploit.Pidief.ONE, VBS/Naiad.O, W97M/Exploit.Agent.K, Win32/Adware.AntiSpyware2008 (2), Win32/Adware.BHO.NCX, Win32/Adware.Coolezweb (6), Win32/Adware.Coolezweb.AB (2), Win32/Adware.Coolezweb.AC (2), Win32/Adware.SpywareProtect2009, Win32/Adware.SystemSecurity (3), Win32/Adware.WinPCDefender (3), Win32/Agent.AFTS, Win32/Agent.HLU, Win32/Agent.NGL (3), Win32/Agent.OOJ, Win32/Agent.PLS (2), Win32/Agent.PLT (4), Win32/Agent.PLU, Win32/Agent.PLV (2), Win32/Agent.PLW (2), Win32/Agent.PLX, Win32/Agent.PLY (2), Win32/AntiAV.AZQ, Win32/AntiAV.NAN (2), Win32/AutoRun.Agent.OF, Win32/AutoRun.FakeAlert.BP, Win32/AutoRun.FlyStudio.JY, Win32/AutoRun.FlyStudio.JZ, Win32/AutoRun.IRCBot.AJ (3), Win32/AutoRun.IRCBot.Q, Win32/AutoRun.KS (3), Win32/BHO.NPI, Win32/Boberog.AB, Win32/Delf.ODU, Win32/Delf.OIX, Win32/FakeInit.M (3), Win32/FlyStudio.NME, Win32/FlyStudio.NMF (8), Win32/Fujacks.BK, Win32/Injector.OZ, Win32/IRCBot.AMC (2), Win32/Koutodoor.G, Win32/Koutodoor.Z (3), Win32/Kryptik.QG, Win32/Kryptik.QH, Win32/Kryptik.QI, Win32/Olmarik.GW (9), Win32/Olmarik.HG (18), Win32/Peerfrag.BB, Win32/Peerfrag.BC, Win32/PSW.OnLineGames.OWG (2), Win32/PSW.WOW.NKN, Win32/Qhost, Win32/Rootkit.Agent.NLR (5), Win32/Rootkit.Ressdt.NBK, Win32/Rootkit.Ressdt.NBL, Win32/Rootkit.Ressdt.NBM, Win32/Rootkit.Ressdt.NBN, Win32/Rustock, Win32/Rustock.NIK, Win32/Sohanad.BM, Win32/Sohanad.NEI, Win32/Spy.Ambler.AA (3), Win32/Spy.Ambler.AB (3), Win32/Spy.Banker.QYL (2), Win32/Spy.Banker.QYM (2), Win32/Spy.Banker.QYN, Win32/Spy.Banker.QYO (2), Win32/Spy.Delf.NUM (4), Win32/Spy.Ursnif.A (4), Win32/Spy.Webmoner.NBQ, Win32/Spy.Zbot.GW, Win32/Spy.Zbot.JF (4), Win32/Spy.Zbot.NJ, Win32/Tifaut.C (2), Win32/TrojanClicker.VB.NHD, Win32/TrojanClicker.VB.NHE (3), Win32/TrojanDownloader.Agent.PCV (4), Win32/TrojanDownloader.Bredolab.AA, Win32/TrojanDownloader.FakeAlert.AAX, Win32/TrojanDownloader.FakeAlert.ACR (2), Win32/TrojanDownloader.FakeAlert.YZ, Win32/TrojanDownloader.Small.NKM, Win32/TrojanDownloader.Small.OPN (10), Win32/TrojanDownloader.VB.NXC (4), Win32/TrojanDownloader.Zlob.CZK, Win32/TrojanDownloader.Zlob.CZU (4), Win32/TrojanDropper.Delf.NNJ, Win32/TrojanProxy.Agent.LV, Win32/TrojanProxy.Agent.NFL (2), Win32/TrojanProxy.Ranky.NCN, Win32/VB.OEQ (4), Win32/VB.OER

URL: http://www.eset.com/joomla/index.php?option=com_content&task=view&id=6071&Itemid=26

4094

4094

BAT/KillWin.NAN (3), BAT/Qhost.NBG, BAT/Qhost.NBN (3), BAT/StartPage.NAV (4), BAT/StartPage.NAW (5), IRC/SdBot, JS/Exploit.Pdfka.NKA (6), PDF/Exploit.Pidief.OMY, SWF/TrojanDownloader.Agent.BB, SWF/TrojanDownloader.Agent.NAW (2), Win32/Adware.AntiSpyware2008, Win32/Adware.BHO.GMI, Win32/Adware.BHO.NCX, Win32/Adware.Coolezweb (4), Win32/Adware.PersonalAntivirus (4), Win32/Adware.PrivacyComponents (5), Win32/Adware.SpywareProtect2009, Win32/Adware.SystemSecurity (4), Win32/Adware.Virtumonde (2), Win32/Adware.Virtumonde.NDH, Win32/Adware.WinPCDefender (4), Win32/Agent.NWW, Win32/Agent.NXT (8), Win32/Agent.OAF, Win32/Agent.PLF, Win32/Agent.PLG, Win32/AutoRun.ADR, Win32/AutoRun.Agent.FC, Win32/AutoRun.Autoit.AK, Win32/AutoRun.Autoit.P, Win32/AutoRun.FlyStudio.JN, Win32/BHO.NOE, Win32/BHO.NOR, Win32/BHO.NPD (4), Win32/Cimag.AL, Win32/Daonol.C (4), Win32/Delf.ODU (2), Win32/Dialer.NHM (2), Win32/FlyStudio.NLU, Win32/FlyStudio.NLV, Win32/FlyStudio.NLW (2), Win32/FlyStudio.NLX, Win32/Fujacks.BK, Win32/Injector.OT, Win32/Injector.OU, Win32/IRCBot.AGP, Win32/Joleee.NL, Win32/KillWin.NAI, Win32/Koutodoor.U (4), Win32/Olmarik.FT (3), Win32/Olmarik.GW (2), Win32/Olmarik.HG (8), Win32/PcClient.NDP, Win32/Pinit.V, Win32/Prosti.NCI, Win32/PSW.OnLineGames.NMP (4), Win32/PSW.OnLineGames.NMY (8), Win32/PSW.OnLineGames.NNU (6), Win32/PSW.OnLineGames.NZM, Win32/PSW.OnLineGames.ODJ (2), Win32/PSW.OnLineGames.XTT, Win32/PSW.VB.AMJ (2), Win32/Qhost (4), Win32/Qhost.NJK (2), Win32/Rootkit.Agent.KIF, Win32/Rustock.NIH, Win32/Rustock.NIK, Win32/SpamTool.Agent.NCL, Win32/Spy.Ambler.M, Win32/Spy.Ambler.Y, Win32/Spy.Banbra.NPL (2), Win32/Spy.Banker.KSO, Win32/Spy.Banker.PJS (2), Win32/Spy.Banker.PJU (2), Win32/Spy.Banker.QNJ, Win32/Spy.Banker.QSE (2), Win32/Spy.Banker.QSF (2), Win32/Spy.Banker.QSG (2), Win32/Spy.Banker.QYC, Win32/Spy.Banker.QYD, Win32/Spy.Zbot.JF, Win32/StartPage.NKH, Win32/TrojanClicker.Agent.NBL, Win32/TrojanClicker.Agent.NBS (7), Win32/TrojanClicker.Agent.NGQ (2), Win32/TrojanClicker.Delf.NDJ, Win32/TrojanClicker.Delf.NDK, Win32/TrojanClicker.Delf.NDM, Win32/TrojanClicker.Delf.NDN, Win32/TrojanClicker.Delf.NDR (3), Win32/TrojanClicker.Delf.NGI (9), Win32/TrojanClicker.Delf.NGK, Win32/TrojanClicker.Delf.NGL, Win32/TrojanClicker.Delf.NGQ, Win32/TrojanClicker.Delf.NGR (2), Win32/TrojanClicker.Delf.NHN, Win32/TrojanDownloader.Agent.PCE, Win32/TrojanDownloader.Agent.PCP, Win32/TrojanDownloader.Alphabet (2), Win32/TrojanDownloader.Alphabet.NAI (2), Win32/TrojanDownloader.Alphabet.P (3), Win32/TrojanDownloader.Bredolab.AA, Win32/TrojanDownloader.Delf.OTS (2), Win32/TrojanDownloader.FakeAlert.AAX, Win32/TrojanDownloader.FakeAlert.ABV, Win32/TrojanDownloader.FakeAlert.ACE, Win32/TrojanDownloader.FakeAlert.ACJ, Win32/TrojanDownloader.FakeAlert.ACK, Win32/TrojanDownloader.FakeAlert.ACL, Win32/TrojanDownloader.FakeAlert.ACM (2), Win32/TrojanDownloader.FlyStudio.G, Win32/TrojanDownloader.Small.OCS (2), Win32/TrojanDownloader.Small.OOT, Win32/TrojanDownloader.Zlob.CZK, Win32/TrojanDropper.Agent.OAV, Win32/TrojanDropper.Joiner.AJ, Win32/TrojanDropper.VB.NHU (2), Win32/TrojanProxy.Small.NCJ, Win32/TrojanProxy.Wintu.B, Win32/VB.NKF, Win32/VB.OEJ, Win32/Wigon.KW

URL: http://www.eset.com/joomla/index.php?option=com_content&task=view&id=6058&Itemid=26

Cybersecurity groups band together in malware fight

Cybersecurity groups band together in malware fight

Three cybersecurity groups said Tuesday they plan to band together to combat the growing scourge of malware.

The Anti-Spyware Coalition, National Cyber Security Alliance, and StopBadware.org said the Chain of Trust Initiative will link together vendors, researchers, government agencies, network providers, and other groups involved in internet security. The members said they want to establish a united front against malware suppliers in much the way groups coalesced to successfully fight providers of adware several years ago.

“Organization and collaboration are out best tools against an enemy that doesn’t play by any rules,” StopBadware.org’s manager, Maxim Weinstein, said in a statement announcing the alliance. “Just by nature of how the internet works, malware distributors have a technological advantage, but we can respond by strengthening our shared networks and by better understanding our shared responsibilities.”

URL: http://www.hackintheboxorg/index.php?name=News&file=article&sid=31379

BBC asks nicely to run second hacking demo

BBC asks nicely to run second hacking demo

The BBC has followed its recent controversial botnet demonstration with a new filmed demo of how a Trojan attack works – except this time it made sure to ask nicely.

In a clear change from the earlier exercise, which provoked intense ethical debate, this time around the corporation has gone out of its way to make clear it sought the permission of the owner of a PC before hacking into it. The latest demo, which appeared on the BBC news website on Monday, illustrates how a single spyware-infected PC creates a means for cybercrooks to nab passwords or watch users of infected PCs, providing the machine uses a webcam.

The BBC sought the assistance of Jacques Erasmus of PrevX in both the latest small-scale exercise and earlier, larger experiment – the difference of course being that none of the computer users in the botnet caper were asked for their permission. BBC researchers changed the wallpaper on compromised machines to alert victims that their machines were infected, but only after running and filming its security demo.

URL: http://www.hackinthebox.org/index.php?name=News&file=article&sid=31369

4087

4087

BAT/StartPage.NAT (2), HTML/TrojanDownloader.IFrame, J2ME/TrojanSMS.Boxer.C (2), J2ME/TrojanSMS.Boxer.J (2), J2ME/TrojanSMS.Konov.E (2), PDF/Exploit.Pidief.OMS, Win32/Adware.BHO.NCX, Win32/Adware.JuSou.L (5), Win32/Adware.PersonalAntivirus (2), Win32/Adware.SpySnipe, Win32/Adware.SpywareProtect2009 (3), Win32/Adware.SystemSecurity (6), Win32/Agent.PFL, Win32/Agent.PKV, Win32/Agent.PKW, Win32/Autoit.NDM (3), Win32/AutoRun.Agent.NY, Win32/AutoRun.FakeAlert.BM, Win32/AutoRun.FakeAlert.M, Win32/AutoRun.FlyStudio.JH, Win32/AutoRun.Qhost.M, Win32/AutoRun.Qhost.P, Win32/Boberog.AA, Win32/FlyStudio.NLN, Win32/Hupigon.GTVV, Win32/IRCBot, Win32/Kryptik.PO, Win32/Obfuscated.NDF, Win32/Olmarik.GW, Win32/Olmarik.HG (2), Win32/PcClient, Win32/PcClient.NDP, Win32/PSW.OnLineGames.NTR (2), Win32/PSW.OnLineGames.OJT (2), Win32/PSW.QQPass.GYF, Win32/Qhost (2), Win32/Qhost.NJV, Win32/Rootkit.Agent.NLF, Win32/Rootkit.Agent.NLT, Win32/Rustock.NIH, Win32/Rustock.NIK, Win32/Sohanad.AS, Win32/SpamTool.Agent.NCI, Win32/SpamTool.Agent.NCL (2), Win32/SpamTool.Rlsloup.B, Win32/SpamTool.Rlsloup.NAA, Win32/Spy.Agent.NNU (3), Win32/Spy.Banker.QSC, Win32/Spy.Zbot.RA, Win32/TCPZ.C, Win32/TrojanClicker.Delf.NGR (2), Win32/TrojanDownloader.Adload.NFN (2), Win32/TrojanDownloader.Agent.PCD, Win32/TrojanDownloader.FakeAlert.ABV, Win32/TrojanDownloader.FakeAlert.ACD (2), Win32/TrojanDownloader.Small.NTQ (3), Win32/TrojanDownloader.Small.OOT (4), Win32/TrojanDownloader.Small.OPH (2), Win32/TrojanDownloader.Small.OPI, Win32/TrojanDropper.Agent.OAQ, Win32/TrojanDropper.Agent.OAR, Win32/TrojanDropper.Microjoin.C, Win32/VB.OEA (6), Win32/VB.OEB (4), Win32/VB.OEC, Win32/Waledac.JP

URL: http://www.eset.com/joomla/index.php?option=com_content&task=view&id=6046&Itemid=26

4085

4085

Win32/Adware.AntiSpyware2008, Win32/Adware.SpywareFighter.AA, Win32/Adware.SystemSecurity (2), Win32/Agent.NOF, Win32/Agent.NWM, Win32/Agent.PAX, Win32/Agent.PAY, Win32/Agent.PCV, Win32/AutoRun.Agent.IE, Win32/AutoRun.AI (2), Win32/Hupigon.NOR (4), Win32/Injector.KE, Win32/Injector.LV, Win32/Injector.ME, Win32/Injector.MH, Win32/Kryptik.MA, Win32/Pacex.Gen, Win32/PSW.OnLineGames.OJW, Win32/PSW.WOW.NIY, Win32/Rootkit.Agent.NKL, Win32/Small.NFW, Win32/SpamTool.Agent.NCL, Win32/Spy.Banbra.NPI (2), Win32/Spy.Banker.PJM, Win32/Spy.Banker.QLP, Win32/Spy.Goldun.BVX, Win32/TrojanClicker.Agent.NGN, Win32/TrojanClicker.Delf.NDJ, Win32/TrojanClicker.Delf.NDK, Win32/TrojanClicker.Delf.NDM, Win32/TrojanClicker.Delf.NDR (3), Win32/TrojanClicker.Delf.NGI (2), Win32/TrojanClicker.Delf.NHK, Win32/TrojanDownloader.Delf.OLA, Win32/TrojanDownloader.Small.OME, Win32/TrojanDropper.Agent.OAP, Win32/VB.NQR

URL: http://www.eset.com/joomla/index.php?option=com_content&task=view&id=6044&Itemid=26

4075

4075

BAT/Agent.NBT (2), JS/Exploit.Pdfka.IP, JS/Exploit.Pdfka.JF, JS/Exploit.Pdfka.NJV (2), JS/Exploit.Pdfka.NJW, JS/Exploit.Pdfka.NJX, JS/Exploit.Pdfka.NJY (3), JS/TrojanClicker.Agent.NAG, JS/TrojanClicker.Agent.NAH, JS/TrojanDownloader.Agent.NQC, JS/TrojanDownloader.Agent.NQD, JS/TrojanDownloader.Agent.NQE, JS/TrojanDownloader.Iframe.NEF, JS/TrojanDownloader.Iframe.NEG, JS/TrojanDownloader.Iframe.NEH, JS/TrojanDownloader.Iframe.NEI, JS/TrojanDownloader.Iframe.NEJ, JS/TrojanDownloader.Iframe.NEK, JS/TrojanDownloader.Iframe.NEL, JS/TrojanDownloader.SWFlash.NBL, PDF/Exploit.Pidief.ODH, PDF/Exploit.Pidief.ODW, PDF/Exploit.Pidief.OFM (2), PDF/Exploit.Pidief.OGV, PDF/Exploit.Pidief.OMM, PHP/PHPInfo.G, Win32/Adware.Agent.NMR (3), Win32/Adware.AntiSpyware2008, Win32/Adware.BHO.NEO, Win32/Adware.BHO.NGL, Win32/Adware.BHO.NGN, Win32/Adware.PrivacyComponents, Win32/Adware.SystemSecurity (5), Win32/Agent.NYB (2), Win32/Agent.OKU, Win32/Agent.PKC (2), Win32/Agent.PKD, Win32/Agent.PKE, Win32/Agent.PKF, Win32/AntiAV.AZQ (2), Win32/AntiAV.NAE, Win32/Autoit.CM, Win32/AutoRun.FlyStudio.IY, Win32/AutoRun.Qhost.N, Win32/ClickLocker (2), Win32/Delf.OHR, Win32/Delf.OIG (2), Win32/Delf.OIH (2), Win32/FlyStudio.NLD, Win32/Inject.YZZ, Win32/Inject.ZJG, Win32/Injector.OK, Win32/IRCBot (2), Win32/Koutodoor.G, Win32/Koutodoor.N (2), Win32/Kryptik.PB, Win32/Kryptik.PC, Win32/Kryptik.PE, Win32/Kryptik.PF, Win32/Kryptik.PG, Win32/Olmarik.HG (2), Win32/Peerfrag.AS, Win32/PSW.Agent.NLK (2), Win32/PSW.LdPinch.NKX, Win32/PSW.LdPinch.NKY, Win32/Qhost (3), Win32/Qhost.NIP (2), Win32/Rootkit.Agent.NKV, Win32/Rootkit.Agent.NLR (5), Win32/Rootkit.Ressdt.NAZ, Win32/SpamTool.Agent.NCL, Win32/Spy.Bancos.NLT (2), Win32/Spy.Banker.GCS (2), Win32/Spy.Banker.KSO, Win32/Spy.Banker.PJS, Win32/Spy.Banker.PPG, Win32/Spy.Banker.QEP, Win32/Spy.Banker.QXO (2), Win32/Spy.Banker.QXP (2), Win32/Spy.Delf.NUF (2), Win32/Spy.Delf.NUG, Win32/Spy.Zbot.JF, Win32/Spy.Zbot.PY, Win32/TrojanClicker.Agent.NGF (2), Win32/TrojanClicker.Delf.NHJ, Win32/TrojanClicker.VB.NGU, Win32/TrojanDownloader.Agent.OXO (2), Win32/TrojanDownloader.Agent.PBT, Win32/TrojanDownloader.Small.OPB (2), Win32/TrojanDownloader.Wigon.BY, Win32/TrojanDropper.VB.NHP (2), Win32/VB.ODP, Win32/VB.ODQ, Win32/VB.ODR (3), Win32/Wigon.KI

URL: http://www.eset.com/joomla/index.php?option=com_content&task=view&id=6027&Itemid=26

4069

4069

BAT/Shutdown.NAJ, VBS/TrojanDownloader.Agent.NAT, Win32/Adware.InternetAntivirus (3), Win32/Adware.PersonalAntivirus, Win32/Adware.SpywareProtect2009 (2), Win32/Adware.SystemSecurity, Win32/Adware.WinPCDefender, Win32/Agent.NXG, Win32/Agent.NXT, Win32/Agent.PJU, Win32/Agent.PJV, Win32/Agent.PJW, Win32/AutoRun.Qhost.M, Win32/Delf.OHJ, Win32/Delf.OHR (2), Win32/FlyStudio.NKX, Win32/Hupigon.AENO, Win32/Hupigon.NOJ, Win32/Injector.IM, Win32/Injector.OF (2), Win32/Injector.OG, Win32/Injector.OH, Win32/IRCBot.ADZ, Win32/IRCBot.AGP, Win32/KillAV.NDR, Win32/Koobface.FX (2), Win32/Kryptik.OZ, Win32/PSW.LdPinch.NEL, Win32/PSW.LdPinch.NKV, Win32/PSW.OnLineGames.NMP, Win32/PSW.OnLineGames.NMY (4), Win32/PSW.OnLineGames.NTZ (3), Win32/PSW.OnLineGames.NUA (2), Win32/PSW.OnLineGames.NZA, Win32/PSW.OnLineGames.NZM (2), Win32/PSW.OnLineGames.ODJ (2), Win32/PSW.OnLineGames.OJO, Win32/PSW.WOW.NKC (2), Win32/Rootkit.Agent.KIR, Win32/Rootkit.Ressdt.NAY, Win32/Spy.Banbra.IBP (4), Win32/Spy.Banker.QEO, Win32/Spy.Banker.QEP, Win32/Spy.Delf.NUE (2), Win32/Spy.Zbot.BA (2), Win32/TrojanClicker.VB.NFM (2), Win32/TrojanDownloader.Agent.PAC, Win32/TrojanDownloader.Delf.OTM, Win32/TrojanDownloader.Small.OOX (2), Win32/TrojanDropper.Agent.NYR, Win32/TrojanDropper.Agent.OAH, Win32/TrojanDropper.Agent.OAI, Win32/TrojanDropper.Agent.OAJ, Win32/TrojanProxy.Small.NDW (3), Win32/VB.ODM

URL: http://www.eset.com/joomla/index.php?option=com_content&task=view&id=6020&Itemid=26

Don’t forget the ASC public workshop

Don’t forget the ASC public workshop

There’s still time to register for the Anti-Spyware Coalition public workshop next week in Washington, DC. And, best of all, press, government, ASC members, educational and nonprofit attendees attend free! (Corporate attendees pay only $250 for a great all-day workshop.)

Complete details and registration links can be found here.

URL: http://blog.stopbadware.org/2009/05/12/dont-forget-the-asc-public-workshop

4067

4067

BAT/Qhost.NBJ (2), BAT/Qhost.NBK, BAT/StartPage.NAS (4), BAT/TrojanDownloader.Ftp.NDB (4), BAT/TrojanDownloader.Ftp.NDC (5), Win32/Adware.AntiSpyware2008, Win32/Adware.Antivirus2008, Win32/Adware.InternetAntivirus (3), Win32/Adware.SystemSecurity, Win32/Adware.WinPCDefender, Win32/Agent.WPI (2), Win32/AutoRun.Agent.NP (2), Win32/AutoRun.FlyStudio.IT, Win32/Delf.ODU (4), Win32/KillAV.NDC (2), Win32/Mypis.AR, Win32/PSW.WOW.NKB (2), Win32/Qhost (2), Win32/Rootkit.Agent.NLD, Win32/Rootkit.Ressdt.NAW, Win32/Rootkit.Ressdt.NAX, Win32/Rustock, Win32/Rustock.NIG (2), Win32/Spy.Banker.QRP (2), Win32/Spy.Banker.QRQ (2), Win32/Spy.Delf.NRL, Win32/Spy.Pophot.NAO, Win32/TrojanDownloader.Agent.OXO (2), Win32/TrojanDownloader.Agent.PBN (4), Win32/TrojanDownloader.Agent.PBO, Win32/TrojanDownloader.Banload.ONO (2), Win32/TrojanDownloader.Banload.OOK (3), Win32/TrojanDownloader.Banload.OPH, Win32/TrojanDownloader.Delf.OTK (2), Win32/TrojanDownloader.Delf.OTL (2), Win32/TrojanDownloader.Small.OOT (2), Win32/TrojanDownloader.VB.NXU (2), WinCE/SMS.Redoc.L (2)

URL: http://www.eset.com/joomla/index.php?option=com_content&task=view&id=6018&Itemid=26

4066

4066

Win32/Adware.Antivirus2008, Win32/Adware.InternetAntivirus (4), Win32/Adware.SpywareProtect2009 (2), Win32/Adware.SystemSecurity (5), Win32/Adware.Virtumonde.NEK, Win32/Adware.WinPCDefender, Win32/Agent.NWM, Win32/Agent.NXX (3), Win32/Agent.WPI, Win32/Delf.OHS, Win32/Drooler.C, Win32/Hupigon.NOG (2), Win32/Hupigon.NOH, Win32/Koutodoor.G, Win32/Koutodoor.H, Win32/Koutodoor.M (2), Win32/Obfuscated.NDE, Win32/PSW.Delf.NOV, Win32/PSW.OnLineGames.NMP (4), Win32/PSW.OnLineGames.NNU (7), Win32/PSW.OnLineGames.XTT (2), Win32/Toolbar.Alibaba (2), Win32/TrojanDownloader.Small.NTQ, Win32/TrojanDropper.Agent.OAF (2)

URL: http://www.eset.com/joomla/index.php?option=com_content&task=view&id=6016&Itemid=26

4065

4065

JS/Exploit.Pdfka.NJR (3), JS/Exploit.Pdfka.NJS (3), JS/TrojanDownloader.Agent.NQB (4), MSIL/TrojanDownloader.Agent.G, PDF/Exploit.Pidief.OMG, PDF/Exploit.Pidief.OMH, SWF/TrojanDownloader.Agent.NAU (2), SWF/TrojanDownloader.Agent.NAV (2), Win32/Adware.PersonalAntivirus, Win32/Adware.SpywareProtect2009 (2), Win32/Adware.WinPCAntivirus, Win32/Agent.NXW, Win32/Agent.PJQ, Win32/Agent.PJR, Win32/Agent.PJS, Win32/Agent.PJT, Win32/AntiAV.AZQ, Win32/AntiAV.NAD (2), Win32/Autoit.DK, Win32/Autoit.EB, Win32/AutoRun.Agent.EU, Win32/AutoRun.Autoit.P, Win32/AutoRun.Delf.BJ (2), Win32/AutoRun.FlyStudio.IS, Win32/AutoRun.IRCBot.AF, Win32/AutoRun.Qhost.L (2), Win32/Delf.NMM, Win32/Delf.NSN (2), Win32/Delf.NSO (4), Win32/Delf.OFA (2), Win32/Delf.OHS, Win32/Delf.OHY (2), Win32/Delf.OHZ, Win32/Delf.OIA, Win32/Hupigon.NOF, Win32/IDefense, Win32/Injector.OC, Win32/IRCBot, Win32/IRCBot.ADZ, Win32/Koobface.FX (2), Win32/Koobface.NAY, Win32/Kryptik.NX, Win32/Kryptik.OX, Win32/Olmarik.GW, Win32/Olmarik.HV (2), Win32/Pinit.J, Win32/Pinit.R (2), Win32/Pinit.S (2), Win32/PSW.Gamania.NBQ, Win32/PSW.OnLineGames.NMP (3), Win32/PSW.OnLineGames.NMY (3), Win32/PSW.OnLineGames.NNU (4), Win32/PSW.OnLineGames.NRD (2), Win32/PSW.OnLineGames.NSU, Win32/PSW.OnLineGames.NUO (2), Win32/PSW.OnLineGames.NZF, Win32/PSW.OnLineGames.ODJ (2), Win32/PSW.OnLineGames.OJL (2), Win32/PSW.OnLineGames.XTT, Win32/PSW.WOW.IBO, Win32/PSW.WOW.NKA (2), Win32/Rootkit.Agent.IRW, Win32/Rootkit.Agent.NLD, Win32/Rootkit.Agent.NLM (2), Win32/Rootkit.Agent.NLN, Win32/Rootkit.Agent.NLO (6), Win32/Spy.Banker.OXB, Win32/Spy.Banker.PJS, Win32/Spy.Banker.QEO, Win32/Spy.Banker.QOQ, Win32/Spy.Banker.QRO, Win32/Spy.Delf.NUB (2), Win32/Spy.Delf.NUC, Win32/Spy.Delf.NUD (3), Win32/Spy.Pophot.NAO, Win32/Spy.Zbot.JF, Win32/Spy.Zbot.PV, Win32/Spy.Zbot.PW, Win32/TrojanDownloader.Agent.OZH, Win32/TrojanDownloader.Agent.PBM, Win32/TrojanDownloader.Agent.PBN (4), Win32/TrojanDownloader.Banload.OPF (2), Win32/TrojanDownloader.Banload.OPG (2), Win32/TrojanDownloader.Banload.PAA, Win32/TrojanDownloader.Delf.OTI (3), Win32/TrojanDownloader.Delf.OTJ, Win32/TrojanDownloader.FakeAlert.ZV, Win32/TrojanDownloader.Small.EVY, Win32/TrojanDownloader.VB.ANF, Win32/TrojanDownloader.VB.NXW, Win32/VB.NQU (2), Win32/VB.NQV, Win32/VB.NZV, Win32/VB.ODG, Win32/VB.ODH, Win32/Wigon.KI (2)

URL: http://www.eset.com/joomla/index.php?option=com_content&task=view&id=6012&Itemid=26