It can be said that this trojan has completely gone against the current trend, when malicious software or code types are primarily aimed at exploiting information theft on infected systems.
Erazer-A Trojans spread primarily through Peer-to-Peer networks or through instant messaging programs. Erazer-A often masquerades as useful programs.
Erazer appears 'find and delete' trojans Picture 1 Once infected, Erazer-A will scan directories used for P2P applications to search for files with AVI, MP3, MPEG, WMV, GIF, ZIP or other file types. to delete. Shortly after that, the trojan rebuked himself after sending a copy of himself to shared folders on the P2P network.
According to security firm Sophos, the Erazer-A trojan is capable of disabling antivirus applications, deleting files, stealing information, downloading other malicious software, reducing system security. system and install itself into the Registry.
Users are advised to update antivirus software to protect their system.