Panda Burning Incense is a virus that can shut down security software processes and has plagued many users in the past two weeks. The author learned today that another worm that can shut down the antivirus software process appeared on the Internet, and today's virus warning is broadcast below. The "clicker variant ad" (Troj.Clicker.ad) Trojan horse virus connects to a specific website to download the actual website to be visited, and then connects to the relevant website. Zinc Door Handle On Zinc Rosette Zinc Door Handle On Zinc Rosette,Zinc Door Handle,Zinc Rosette Door Handle,Zinc Alloy Door Handle Wenzhou Shenghong Metal Products Co.,Ltd , https://www.shenghonglock.com
Beijing Information Security Evaluation Center and Jinshan Duba jointly released the popular virus on January 28, 2007.
Today, users are reminded to pay special attention to the following viruses: "Clicker variant ad" (Troj.Clicker.ad) and "QQ thief variant gi" (Troj.PSWQQ.gi).
The "QQ 大盗 å˜ç§ gi" (Troj.PSWQQ.gi) Trojan virus, targeting the hacking Trojans of the QQ real-time chat software, is mainly spread through Internet deception.
According to the Rising Global Anti-Virus Surveillance Network, there is a virus that deserves special attention today. It is the "Paragon CK (Worm.Pabug.ck)" virus. The virus will spread through USB drives, mobile hard drives, and malicious web pages, and will cause some security software to fail to use normally, posing a greater threat to user information security.
Jinshan's popular viruses today:
1. "Troj.Clicker.ad" threat level: ★
The virus is a network access tool for adding relevant website traffic under the Windows platform. After the virus runs, it copies itself to the following pseudo system normal files to confuse users:% Windir% system32ctfmdn.exe, connect to a specific website to download the actual website to be visited, and then connect to the relevant website. Viruses are mainly spread through network spoofing.
2. "QQ 大盗 å˜ç§ gi" (Troj.PSWQQ.gi) threat level: ★
This virus is a hacking Trojan designed specifically for QQ instant chat software under the Windows platform. When the virus is running, it copies itself to the following pseudo system program:% Windir% system32RPCS.exe, and it pretends to be a normal system service, making it difficult for users to detect. When the virus is running, monitor and record by calling the IE program and send the Q account password information to the virus author. The virus is mainly spread through network deception.
Kingsoft Anti-Virus Engineer recommends:
1. Please do not run files that have not been processed by anti-virus software after downloading from the Internet. It is strongly recommended that you scan with the latest antivirus database and then decide whether to run it.
2. When the operator controls the user's computer, it can directly cause the user's information to be leaked. For the safety of your system and personal information, experts recommend that users use the latest antivirus software to scan when opening a strange file.
Rising's popular viruses today:
According to the Rising Global Anti-Virus Surveillance Network, there is a virus that deserves special attention today. It is the "Paragon CK (Worm.Pabug.ck)" virus. The virus will spread through USB drives, mobile hard drives, and malicious web pages, and will cause some security software to fail to use normally, posing a greater threat to user information security.
"Paworm CK (Worm.Pabug.ck)" virus: Vigilance ★ ★ ★ ☆, worm virus, spread through USB, mobile hard disk and malicious web pages, depending on the system: WIN 9X / NT / 2000 / XP / 2003
The virus uses Delphi language and is packed with FSG2.0. After the virus runs, it will release files named "gfosdg.exe", "gfosdg.dll", "severe.exe" into the system directory. The virus will try to turn off the personal firewall and anti-virus software. At the same time, the virus will add information in the Image File Execution Options item in the registry, causing the user to automatically activate the virus when running some anti-virus software, thereby posing a threat to user information security.