Showing posts with label Win32/Kryptik.NBQ trojan (variant). Show all posts
Showing posts with label Win32/Kryptik.NBQ trojan (variant). Show all posts

Thursday, May 12, 2011

Win32/Kryptik.NBQ trojan (variant)

This is a Trojan detection. Unlike viruses, Trojans do not self-replicate. They are spread manually, often under the premise that they are beneficial or wanted. The most common installation methods involve system or security exploitation, and unsuspecting users manually executing unknown programs. Distribution channels include e-mail, malicious or hacked Web pages, Internet Relay Chat (IRC), peer-to-peer networks, etc.

Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial. Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.


Also Known As

Win32:Renosa-D
TR/Kazy.20990.8
Trojan.Win32.FakeAv.cufv
Gen:Variant.Kazy.20990
Trojan.Fakealert.20509
W32/FakeAV.BTQ!tr
rogue:win32/fakerean
Trojan.Fakeav
Win32/Kryptik.NBQ trojan (variant)
Mal/FakeAV-JR


Stopping the Win32/Kryptik.NBQ trojan (variant) Virus

Stopping the Win32/Kryptik.NBQ trojan (variant) virus from starting up is the best method from being infected.  Process Lock is a program that stops programs from running if they have not been authorized by the management client.  Process Lock monitors all active processes and reports what is running.  What's so easy about it, is that they offer a feature called "Kill All Not Acknowledged".  This allows you to set what you want to be able to run, and what you do not.  Therefore, a process that the virus tries to start will be denied before it has a chance to infect your system.

Process Lock is not just a process blocker, but it is also a computer monitoring solution.  Process Lock has the ability to record computer sessions, block specific programs, watch children and spouse activity and so much more.  Check out their site at http://www.cloudteksoftware.com/software.html


Removing the Win32/Kryptik.NBQ trojan (variant) Virus

In order to completely remove the threat from a computer, it is best to download and run Malwarebytes Anti-Malware. Sometimes, Trojans will block the downloading and installation of MBAM. If this happens, download it from a clean computer and rename the executable file before executing on the infected computer.

To thoroughly clean a computer, it is best to do a separate scan of another security program so that other infected files not detected by anti-virus application can be remove as well. Download and run SuperAntiSpyware Portable Scanner.

A free removal tool from Norton Antivirus was developed to remove unfamiliar threats without using the traditional AV signatures. Download the tool and start scanning with Norton Power Eraser.