Trojans - Page 155 category archyve:


Does your anti-virus tool detect Backdoor.ProxyBot.E but cannot remove it from the system? If so, this is the right time to change your security tool into SpyHunter and remove Backdoor.ProxyBot.E without any problems. Click on the download button to get a free scan, which will immediately identify the infections running in the system. Read more »


VirTool:MSIL/Injector.gen!G is a dangerous Trojan infection. Its name reveals what kind of type of infection it is - this Trojan is an injector and means that it injects malicious codes into genuine system processes allowing other malware applications to hide their presence from security products. As such, VirTool:MSIL/Injector.gen!G seldom comes alone. It is usually a constituent part of other infections. This Trojan is written in the Common Intermediate Language (previously known as Microsoft Intermediate Language) and it has rootkit features that allow the Trojan to hide itself as well. Read more »


Mal/Bredo-Q is a Trojan infection which penetrates into the system through an email attachment, which, depending on the victim’s geographical location, is sent by USPS or Royal Mail. The threat comes as a ZIP file or Microsoft Office document and can cause a lot of damage to the system. In the case of USPS, the sender is presented as “Postal Service”, Read more »

ANTIGEN Trojan Virus

ANTIGEN is a Trojan horse, which is identified by other anti-virus tools as, for example, PWSteal.Antigen and Trojan.PSW.Antigen.c. The Trojan must be removed from the system, because it can collect your passwords so that cyber schemers can access the system afterwards in order to perform illegal actions. As this is a clear violation of your privacy, you should immediately remove ANTIGEN Trojan Virus to prevent the invasion of remote attackers to the system. To do so, install SpyHunter, which will remove the virus easily. Read more »


Trojan.Healsock, also known as Trojan:Win32/Healsock, is an infection that can corrupt your Windows system without your knowledge. Schemers have been noticed to propagate the clandestine program via spam email attachments, infected links, misleading online ads and other virtuasl scams. Once the Trojan enters your computer, it is possible that cyber crooks will use your personal accounts to spread malignant components across the web. Read more »


Most Windows users discover Trojan.Agent.kro running on their computer when it is too late and their computers are either corrupted with secondary infections or their virtual privacy is breached. Schemers do not need authorization to slither in the Trojan into your PC. However, you can prevent this if you install security tools that would delete Trojan.Agent.kro or make it impossible for virtual crooks to utilize various security gaps that can be used to propagate malicious programs. Read more »


Trojan.Reveton.F is a Trojan which is notorious for the spread of ransomware infections. The Trojans can get in the system via drive-by downloads, when visiting compromised websites, etc. Once the infection modifies the Registry, corrupts processes, changes security settings and disables the access to the system, it displays a bogus announcement message stating that the computer has been locked by some law enforcement agency which has inspected your PC. Read more »


Beast, or Beast virus, is a cunning computer infection classified as a remote access Trojan (RAT). The unwanted infection enters the system unnoticed, and after modifying the settings, the infection allows remote attackers to access the targeted computer. Read more »

Cycbot Trojan

It is common for rogue antispyware to arrive at your system via some other malicious program that infects your computer first. The same scheme applies to Cycbot trojan. This backdoor Trojan distributes such rogue antispyware applications as Palladium, ThinkPoint, CleanThis and others. Therefore, if you remove Cycbot trojan in time, you will prevent a much more serious infection. Unfortunately, most of the time Cycbot trojan remains unnoticed for a very long time and causes a lot of problems. Read more »

GOZI Trojan

Even though GOZI Trojan has been around since 2007, cyber criminals still use this potent infection to generate completely illegal profit. To slip the infection into operating Windows systems schemers can use various Internet Explorer and Mozilla Firefox exploits, which is why you need to browse with utmost care if you do not want the infection running within the PC. To stay on the safe side, you should disregard illegal P2P file sharing sites, ignore spam emails and stay alert of potential social engineering scams. Read more »