CMC warns the new Trojan
A serious vulnerability in Windows Shell was discovered on July 15 and is currently being exploited by Stuxnet malware, while Microsoft has yet to release a patch .
However, users can be assured because the anti-virus versions of CMC Internet Security / CMC Antivirus have detected and killed the Trojan variants that take advantage of this security hole.
This vulnerability was exploited by hackers to execute malicious code with the aim of taking full control of the user's system. After successful occupation, they will install malicious programs, change or delete data. It is worth mentioning here that just if the user plugs the USB into the computer which contains the .Ink file (shortcut format) that has been embedded the malicious code, the malicious file will be executed as soon as the user clicks on the USB. The danger of this vulnerability is that the virus can automatically activate even if the user has disabled AutoPlay and AutoRun.
Windows versions affected by this error include : Windows XP SP3, XP Pro x64 SP2, Windows Server 2003 SP2, Server 2003 x64 Edition SP2, Vista SP1 / SP2, Vista x64 SP1 / SP2, Windows Server 2008 / SP2 and x64 / SP2, Windows 7 32-bit and 64-bit, Windows Server 2008 R2 64-bit.
CMC InfoSec security experts recommend users to use USB scanning antivirus software before performing any operation, and should monitor and update the patch as soon as Microsoft offers.
You should read it
- New discovery of the first version of Stuxnet malicious code
- How to use Open-Shell in Windows 11
- Stuxnet worm targets Iran's nuclear reactor
- What is a Trojan? How to avoid trojan attack?
- Learn super viruses that are threatening the global industry
- Everything you can do with the new Windows 10 Bash Shell
- What is Google Cloud Shell? What's remarkable about Cloud Shell?
- The United States and Israel are behind the Stuxnet worm, according to the New York Times
May be interested
- The new Trojan BagleDl-U is spreading fasta new trojan appears to have infected millions of e-mails globally over the past two days. this trojan, called bagledl-u, also has the ability to disable security tools running on your computer.
- Trojan-Downloader_Win32_Agent.nmithe trojan downloads another program through the internet and launches it on the victim's computer without the user's knowledge or permission.
- The intense revival of Briz Trojansecurity firm panda software has just warned of the emergence of a new variant of the trojan horse. trojans briz is a trojan specializing in stealing passwords and online bank account details of users.
- How trojan pretends to be a PDF file using the RLO . methodyou cannot guarantee that a file is really an image, video, pdf or text file just by looking at the file extension. on windows, an attacker can execute a pdf file as if it were an exe file.
- A fake trojan appears Microsoft Wordsecurity experts are now warning users of a new trojan hidden in microsoft word files that are spreading widely through a spam campaign. the kukudro-a trojan often falsely provides information about property
- A trojan appearance ... 'talking'hackers have just launched a 'talking' trojan that can give users a sarcastic voice when it successfully infects their pc.
- Warning about a new phishing trojan linesecurity experts have discovered a new trojan using a different communication procedure than other types of malware to send data to avoid detection.
- Yusufali-A - trojan against 'black web'experts at sophoslabs lab - a virus and spam analytics research center of sophos security company - have just announced a new type of trojan capable of preventing access to all sites.
- LokiBot - bank trojan on Android turns into ransomware when you try to delete itsecurity agents have discovered a new bank trojan on android called lokibot that turns into extortion code and locks the phone when the user tries to delete its admin rights.
- Description of template Trojan-PSW.Win32.Qbot.mkclassified as trojan-psw - for the purpose of stealing personal information, accounts include user login and password access on the infected computer. psw is an acronym for password stealing ware