Zcodec - New threat for Net users
Panda Software has announced the recognition of a new malicious piece of software called Zcodec, 'disguised' as an application that can install standard video code for various multimedia formats.
Zcodec is an adware protected by a rootkit program. When operating on an infected computer, Zcodec creates an EXE file in the folder C: Program FilesHQ CODEC . This file will be deleted every time it runs and another EXE file, bearing a random name that will appear in the Windows system directory. This new file is 'injected' into the Internet Explorer processing section, so that it can be activated whenever users use the browser.
The infected computer will have DNS settings changed. Therefore, when performing a search through search engines, users will be redirected to other websites instead of web pages that display search results to make users click on advertising links or submit them. Service for plotting to steal personal information. They also track users when accessing sites with 'sex' content.
In addition, this adware also executes two random tasks. It will download and install the trojan called Ruins.MB , this Trojan uses rootkit techniques to hide itself. Or will repeatedly ask users to install an online gambling application.
Operating on most versions of the operating system Windows 95/98 / ME / NT / 2000 / XP / 2003 , Zcodec is rated as a new combination in operating structure, including trojans, rootkits and Even entice computer settings. Moreover, they infiltrated the computer in a "smooth", without any doubt, causing misery to fail.
PandaLabs recommends that users should use well-rated anti-virus programs from users, scan each file one by one and get regular updates of data or use the online scanner here.
ONLINE
You should read it
- Which file system should be used for removable storage devices
- A series of leaked photos shows that File Explorer is about to receive a complete design overhaul on Windows 11
- Tips for reformatting USB to run on Windows, Linux, Mac and many other operating systems
- Edit the Boot.ini file in Windows XP
- How to change the file's attributes using the Attrib command
- Good features on OS X you may not know yet
- Completely delete data in Windows
- Quick fix 'All files converted to .lnk files'
May be interested
- Smishing - Serious security threatsmishing, a phishing form, is when someone tries to trick you into giving them private information via text messages or sms messages. smishing is becoming a new and increasingly dangerous threat in the online security world.
- Online security: 80 steps of defense for NET users - Part 4spyware and spyware today are not only a frustrating concern but have become a security and privacy threat. these software also contribute to opening c
- New Trojan keylogger disables both virtual keyboardsvirtual keyboard which is considered a salvage solution for users before the keylogger threat has now lost its advantage over the new generation of keylog malware.
- Microsoft warns of new malware threat spread through Teamsmicrosoft has just issued an urgent cybersecurity alert regarding a threat actor using microsoft teams chats to spread malware.
- How to fix Your virus & threat protection is managed by your organizationon windows, microsoft equips users with an anti-virus software called windows defender (also known as microsoft defender, windows security...).
- What is the method of attacking APT network?apt - advanced persistent threat is the term used to describe an attack campaign using the most advanced, high-tech techniques to hit the system's weaknesses implemented by a group of attackers.
- Warning the emergence of ransomware DDoS attack, the scale can be up to 800Gbpsalthough it is not a new form of attack, ddos has always been considered as the leading threat to organizations and businesses globally.
- BlackBerry does not see Xiaomi as a competitorxiaomi and obi are seen as rivals by many firms in emerging markets, but blackberry ceo john chen does not see it as a major threat.
- Microsoft brings Windows Defender Antivirus to macOSmicrosoft decided to bring the windows defender advanced threat protection (atp) software to another macos platform of the macbook and change its official name to the microsoft defender advanced threat protection.
- Attack analysis uses Excel 4.0 macros to disguiseon october 18, 2018, 360 threat intelligence center for the first time recorded an example of an attack using excel 4.0 macro to spread the trojan remote control imminent monitor.