Skip to main content
Skip to main content
Microsoft Security Intelligence
480 entries found. Displaying page 1 of 24.
Updated on May 20, 2010
Virus:Win32/Alureon.G is a detection for system drivers infected by members of the Win32/Alureon family.
 
Win32/Alureon is a multi-component family of trojans involved in a broad range of subversive activities online in order to generate revenue from various sources for its controllers. Mostly, Win32/Alureon is associated with moderating affected user's activities online to the attacker's benefit. As such, the various components of this family have been used for:
  • modifying affected user's search results (search hijacking)
  • redirecting affected user's browsing to sites of the attacker's choice (browser hijacking)
  • changing DNS settings in order to redirect users to sites of the attacker's choice without the affected user's knowledge
  • downloading and executing arbitrary files, including additional components and other malware
  • serving illegitimate advertising
  • installing Rogue security software
  • banner clicking
 
Win32/Alureon also utilizes advanced stealth techniques in order to hinder the detection and removal of its various components.
 
As some variants of this trojan may modify DNS settings on the host computer to enable the attacker to perform these tasks. Therefore it may be necessary to reconfigure DNS settings after the trojan is removed from the computer.
Alert level: severe
Updated on Mar 27, 2016
Windows Defender detects this threat.
 
This trojan is a variant of the Alureon malware family. It infects your PC's master boot record.
 
See the Win32/Alureon family description for more information.
Alert level: severe
Updated on Mar 27, 2016

Windows Defender detects this threat.

This family of data-stealing trojans can give a malicious hacker access to collect confidential information stored in your PC, such as your user names, passwords, and credit card data.

They can also send malicious data to your PC and corrupt some driver files, making them unusable.

Find out ways that malware can get on your PC.

Alert level: severe
Updated on Dec 29, 2014

Microsoft security software detects this threat.

This family of data-stealing trojans can give a malicious hacker access to collect confidential information stored in your PC, such as your user names, passwords, and credit card data.

They can also send malicious data to your PC and corrupt some driver files, making them unusable.

See the Win32/Alureon family description for more information.

Find out ways that malware can get on your PC.

Alert level: low
Updated on May 14, 2014
Windows Defender Antivirus detects and removes this threat.
 
This family of data-stealing trojans can give a malicious hacker access to collect confidential information stored in your PC, such as your user names, passwords, and credit card data.
 
They can also send malicious data to your PC and corrupt some driver files, making them unusable.
 
See the Win32/Alureon family description for more information.
 
Alert level: high
Updated on Dec 29, 2014

Microsoft security software detects this threat.

This virus is part of the Win32/Alureon family of data-stealing malware. They can give a malicious hacker access to steal your confidential information such as your user names, passwords, and credit card data. 

They can also send malicious data to your PC and corrupt some driver files, making them unusable.
 
Alert level: severe
Updated on Nov 18, 2013

Windows Defender detects and removes this threat.

This virus is a component of Win32/Alureon - a family of data-stealing malware. They allow a hacker to collect confidential information such as your user names, passwords, and credit card data. 

They can also send malicious data to your computer and corrupt some driver files, making them unusable.
Alert level: severe
Updated on Jul 22, 2013

Virus:Win32/Alureon.gen!A is a component of Win32/Alureon - a family of data-stealing malware. Alureon allows an attacker to intercept incoming and outgoing Internet traffic in order to gather confidential information such as user names, passwords, and credit card data. Win32/Alureon may also allow an attacker to transmit malicious data to your computer.
 
This threat can make it difficult for you to download, install or update your virus protection, whether you have an antivirus product such as Microsoft Security Essentials installed on your computer or not.

If you suspect you have been infected with this threat, we recommend using Windows Defender Offline to detect and remove it; please see detailed instructions on how to use Windows Defender Offline below.

Alert level: severe
Updated on Jul 22, 2013

Virus:Win32/Alureon.gen!C is a component of Win32/Alureon - a family of data-stealing malware. Alureon allows an attacker to intercept incoming and outgoing Internet traffic in order to gather confidential information such as user names, passwords, and credit card data. Win32/Alureon may also allow an attacker to transmit malicious data to your computer.
 
This threat can make it difficult for you to download, install or update your virus protection, whether you have an antivirus product such as Microsoft Security Essentials installed on your computer or not.

If you suspect you have been infected with this threat, we recommend using Windows Defender Offline to detect and remove it; please see detailed instructions on how to use Windows Defender Offline below.

Alert level: severe
Updated on Jul 03, 2014
Alert level: severe
Updated on Jul 04, 2014
Alert level: severe
Updated on Jul 04, 2014
Alert level: severe
Updated on Sep 24, 2010
Trojan:WinNT/Alureon.H is detection for kernel-mode driver component of members of the Win32/Alureon family. The component functions as a rootkit to hide it and other components of the Win32/Alureon trojan family.
Alert level: severe
Updated on Sep 24, 2011

Trojan:Win32/Alureon.FJ is a trojan that drops a malicious driver, detected as Trojan:WinNT/Alureon.Z, in the affected computer.

Alert level: severe
Updated on Jan 07, 2013
Trojan:Win32/Mashigoom.F is a malicious program that is unable to spread of its own accord. It may perform a number of actions of an attacker's choice on an affected computer.
Alert level: severe
Updated on Oct 16, 2014
This is a malicious program that is unable to spread of its own accord. It may perform a number of actions of an attacker's choice on an affected computer.
Alert level: severe
Updated on Apr 11, 2011
Trojan:Win32/Alureon.DN is a detection of a DLL component of the Win32/Alureon family. The malware may attempt to embed HTML code into Web pages the affected user browses, and may attempt to redirect certain URLs.
Alert level: severe
Updated on Sep 07, 2010
Win32/Alureon is a multi-component family of data-stealing trojans. These trojans allow an attacker to intercept incoming and outgoing Internet traffic in order to gather confidential information such as user names, passwords, and credit card data. The Win32/Alureon trojan may also allow an attacker to transmit malicious data to the infected computer. The trojan may modify DNS settings on the host computer to enable the attacker to perform these tasks. As a result, it may be necessary to reconfigure DNS settings after Win32/Alureon is removed from the computer.
 
Trojan:Win32/Alureon.DA is used to download and install other malware, such as Rogue:Win32/FakeCog
Alert level: severe
Updated on Apr 16, 2010
Virus:Win32/Alureon.F is a detection for system drivers infected by members of the Win32/Alureon family.
Alert level: severe
Updated on Apr 16, 2010
Virus:Win32/Alureon.C is a detection for system drivers infected by members of the Win32/Alureon family.
 
Win32/Alureon is a multi-component family of trojans involved in a broad range of subversive activities online in order to generate revenue from various sources for its controllers. Mostly, Win32/Alureon is associated with moderating affected user's activities online to the attacker's benefit. As such, the various components of this family have been used for:
  • modifying affected user's search results (search hijacking)
  • redirecting affected user's browsing to sites of the attacker's choice (browser hijacking)
  • changing DNS settings in order to redirect users to sites of the attacker's choice without the affected user's knowledge
  • downloading and executing arbitrary files, including additional components and other malware
  • serving illegitimate advertising
  • installing Rogue security software
  • banner clicking
 
Win32/Alureon also utilizes advanced stealth techniques in order to hinder the detection and removal of its various components.
 
As some variants of this trojan may modify DNS settings on the host computer to enable the attacker to perform these tasks. Therefore it may be necessary to reconfigure DNS settings after the trojan is removed from the computer.
Alert level: severe