Appeared malicious software 'clones' famous software
BitDefender - the leading provider of security solutions in the world has discovered and warned the return of famous brand clone software.
BitDefender, the world's leading provider of security solutions, has discovered and warned of the return of famous brand clone software .
The targeted 'bad' software this time is the Office ® 2010 Beta version. Just a week after the counterfeit software test of Windows 7, this time hackers launched a new fake Trojan, Office 2010.
The fake trojan hid under the shadow of Office 2010 is advertised on the Internet with very attractive titles to attract curious users to download. This malicious phishing product also promises to save users' time by attaching a beta version to the message as a compact zip file. This convenience makes many people eager to download and trap.
When extracting this file, security experts obtained an exe file named after the key to activate the Office® 2010 Beta version. BitDefender's global data security analysis identified it as Trojan.Downloader.Delf.RUJ , a malware running on a Windows platform designed to infiltrate a user's computer, secretly opening a path guide. When the 'entrance' is wide open, a large amount of adware and spyware will spill into your computer, creating countless popup ads.
After installation, the Trojan creates a copy of itself and modifies the registry to run the corresponding copies each time Windows starts. Then it tries to connect to an IP address to download other malicious files.Trojan.Downloader.Delf.RUJis becomes an extremely dangerous threat to personal data and financial data.
To ensure safety, BitDefender recommends that users download the software from the official vendor's website, not from unknown sites. Besides, an indispensable operation is to scan attachments with antivirus software strong enough before opening them.
You've just finished reading the article "Appeared malicious software 'clones' famous software" edited by the TipsMake team. You can save appeared-malicious-software-clones-famous-software.pdf to your computer here to read later or print it out. We hope this article has provided you with many useful tech tips and tricks. You can search for similar articles on tips and guides. Thank you for reading and for following us regularly.
- Dirty SEO campaign brings a series of malicious software to the top of search
- Appeared software can penetrate iCloud, Google Drive
- Top 10 most dangerous malicious codes in December 2006
- Risk of ransomware infection when downloading crack software online
- Learn and use the Windows Malicious Software Removal Tool
- A malicious extension 'occupies' Chrome and Firefox browsers appears, preventing users from uninstalling