Skip to main content
Skip to main content
Microsoft Security Intelligence
480 entries found. Displaying page 2 of 24.
Updated on Apr 16, 2010
Trojan:Win32/Alureon.DP is a member of Win32/Alureon - a multi-component family of trojans involved in a broad range of subversive activities online that generate revenue from various sources for its controllers. Mostly, Win32/Alureon is associated with moderating an affected user's online activities to the attacker's benefit.
Alert level: severe
Updated on Sep 07, 2010
Trojan:Win32/Alureon.BT is a trojan that may modify the system's security settings and may drop other malware.
 
For more information refer to the description for the Win32/Alureon family.
Alert level: severe
Updated on Apr 11, 2011
Trojan:Win32/Alureon.CT is a trojan that may send system information to a remote address.
 
For more information refer to the description for the Win32/Alureon family.
Alert level: severe
Updated on Sep 07, 2010
Trojan:Win32/Alureon.DC is a member of Win32/Alureon - a multi-component family of trojans involved in a broad range of subversive activities online that generate revenue from various sources for its controllers. Mostly, Win32/Alureon is associated with moderating affected user's activities online to the attacker's benefit. In the wild, Trojan:Win32/Alureon.DC is used to download and install other malware, such as Rogue:Win32/FakeCog
Alert level: severe
Updated on Sep 07, 2010
Trojan:Win32/Alureon.DH is a member of Win32/Alureon - a multi-component family of trojans involved in a broad range of subversive activities online that generate revenue from various sources for its controllers. Mostly, Win32/Alureon is associated with moderating an affected user's activities online to the attacker's benefit. In the wild, Trojan:Win32/Alureon.DH is used to download and install other malware, such as Rogue:Win32/FakeCog.
Alert level: severe
Updated on May 21, 2010
Trojan:Win32/Alureon.gen!S is generic detection for Win32/Alureon, a trojan that may help an attacker intercept inbound and outbound Internet traffic from an infected computer. This may allow an attacker to capture confidential information such as user names, passwords, and credit card data. The trojan may also enable an attacker to transmit malicious data to the infected computer.
 
Trojan:Win32/Alureon.gen!S may install a driver detected as Trojan:WinNT/Alureon.D.
Alert level: severe
Updated on May 20, 2010
Virus:Win32/Alureon.G is a detection for system drivers infected by members of the Win32/Alureon family.
 
Win32/Alureon is a multi-component family of trojans involved in a broad range of subversive activities online in order to generate revenue from various sources for its controllers. Mostly, Win32/Alureon is associated with moderating affected user's activities online to the attacker's benefit. As such, the various components of this family have been used for:
  • modifying affected user's search results (search hijacking)
  • redirecting affected user's browsing to sites of the attacker's choice (browser hijacking)
  • changing DNS settings in order to redirect users to sites of the attacker's choice without the affected user's knowledge
  • downloading and executing arbitrary files, including additional components and other malware
  • serving illegitimate advertising
  • installing Rogue security software
  • banner clicking
 
Win32/Alureon also utilizes advanced stealth techniques in order to hinder the detection and removal of its various components.
 
As some variants of this trojan may modify DNS settings on the host computer to enable the attacker to perform these tasks. Therefore it may be necessary to reconfigure DNS settings after the trojan is removed from the computer.
Alert level: severe
Updated on Nov 02, 2011

Trojan:DOS/Alureon.C is the detection name for infected Master Boot Records (MBR) produced by certain variants of the Win32/Alureon rootkit family. The rootkit infects 32-bit and 64-bit systems.

Alert level: severe
Updated on Apr 16, 2010
Trojan:Win32/Alureon.gen!U is a generic detection for a component of Win32/Alureon - a family of data-stealing trojans. These trojans allow an attacker to intercept incoming and outgoing Internet traffic in order to gather confidential information such as user names, passwords, and credit card data. The Win32/Alureon trojan may also allow an attacker to transmit malicious data to the infected computer. The trojan may modify DNS settings on the host computer to enable the attacker to perform these tasks. Therefore it may be necessary to reconfigure DNS settings after the trojan is removed from the computer.
Alert level: severe
Updated on Apr 16, 2010
Trojan:Win32/Alureon.DB is a member of Win32/Alureon - a multi-component family of trojans involved in a broad range of subversive activities online in order to generate revenue from various sources for its controllers. Mostly, Win32/Alureon is associated with moderating affected user's activities online to the attacker's benefit. As such, the various components of this family have been used for:
  • modifying affected user's search results (search hijacking)
  • redirecting affected user's browsing to sites of the attacker's choice (browser hijacking)
  • changing DNS settings in order to redirect users to sites of the attacker's choice without the affected user's knowledge
  • downloading and executing arbitrary files, including additional components and other malware
  • serving illegitimate advertising
  • installing Rogue security software
  • banner clicking
 
Win32/Alureon also utilizes advanced stealth techniques in order to hinder the detection and removal oif its various components.
 
As some variants of this trojan may modify DNS settings on the host computer to enable the attacker to perform these tasks. Therefore it may be necessary to reconfigure DNS settings after the trojan is removed from the computer.
 
Trojan:Win32/Alureon.DB appears to be used for increasing traffic to a particular page and is most likely installed by other Alureon components.
Alert level: severe
Updated on Apr 16, 2010
Trojan:Win32/Alureon.B is a trojan that may help an attacker intercept inbound and outbound Internet traffic from the host computer. This may allow an attacker to capture confidential information such as user names, passwords, and credit card data. The trojan may also enable an attacker to transmit malicious data to the infected computer. Trojan:Win32/Alureon.B may modify DNS settings on the host computer to enable the attacker to perform malicious tasks. Therefore it may be necessary to reconfigure DNS settings after the trojan is removed from the computer.
Alert level: severe
Updated on Apr 16, 2010
Trojan:Win32/Alureon.gen!C is a component of Win32/Aureon - a family of data-stealing trojans. These trojans allow an attacker to intercept incoming and outgoing Internet traffic in order to gather confidential information such as user names, passwords, and credit card data. The Win32/Alureon trojan may also allow an attacker to transmit malicious data to the infected computer. The trojan may modify DNS settings on the host computer to enable the attacker to perform these tasks. As a result, it may be necessary to reconfigure DNS settings after Win32/Alureon is removed from the computer.
Alert level: severe
Updated on Apr 16, 2010
Trojan:Win32/Alureon.gen!D is a generic detection for a Trojan that may modify DNS settings on the host computer to enable the attacker to perform malicious tasks. These tasks could include intercepting inbound and outbound Internet traffic from the host computer, and capturing confidential information such as user names, passwords, and credit card data.
 
Please note that it may be necessary to reconfigure DNS settings after the Trojan is removed from the computer.
Alert level: severe
Updated on Apr 16, 2010
Trojan:Win32/Alureon is a trojan that may help an attacker intercept inbound and outbound Internet traffic from an infected computer. This may allow an attacker to capture confidential information such as user names, passwords, and credit card data. The trojan may also enable an attacker to transmit malicious data to the infected computer. Trojan:Win32/Alureon.gen!H may modify DNS settings on the host computer to enable the attacker to perform these malicious tasks. Therefore it may be necessary to reconfigure DNS settings after the trojan is removed from the computer.
Alert level: severe
Updated on Apr 16, 2010
Win32/Alureon.gen!J is a trojan that attempts to modify DNS settings on network routers.
Alert level: severe
Updated on Apr 16, 2010
Trojan:Win32/Alureon.gen!K is a generic detection for a component of Win32/Alureon - a family of data-stealing trojans. These trojans allow an attacker to intercept incoming and outgoing Internet traffic in order to gather confidential information such as user names, passwords, and credit card data. The Win32/Alureon trojan may also allow an attacker to transmit malicious data to the infected computer. The trojan may modify DNS settings on the host computer to enable the attacker to perform these tasks. Therefore it may be necessary to reconfigure DNS settings after the trojan is removed from the computer.
 
This particular component is used to subvert the user's Internet interaction by redirecting requests for particular domains.
Alert level: severe
Updated on Apr 16, 2010
Trojan:Win32/Alureon.gen!P is a generic detection for a trojan that may modify DNS settings on the host computer to enable the attacker to perform malicious tasks. These tasks could include intercepting inbound and outbound Internet traffic from the host computer, and capturing confidential information such as user names, passwords, and credit card data.
 
For more information, please refer to the Win32/Alureon family description elsewhere in the encyclopedia.
 
Please note that it may be necessary to reconfigure DNS settings after the Trojan is removed from the computer.
Alert level: severe
Updated on Apr 16, 2010
Trojan:Win32/Alureon.gen!R is the generic detection for a DLL component of trojan that modifies DNS settings on the infected computer, enabling an attacker to perform malicious tasks. These may include intercepting Internet traffic and thus capturing confidential information such as user names, passwords, and other sensitive data.
 
For more information on this family of trojans please check the Win32/Alureon description in the encyclopedia.
Alert level: severe
Updated on Apr 16, 2010
Trojan:WinNT/Alureon.C is a generic detection for encrypted rootkit drivers that are used to hide processes and the registry entry associated with it.
Alert level: severe
Updated on Apr 16, 2010
Trojan:WinNT/Alureon.D is detection for an obfuscated kernel-mode root kit component of the Win32/Alureon family. Win32/Alureon is a family of data-stealing trojans that allow an attacker to intercept incoming and outgoing Internet traffic to gather confidential information such as user names, passwords and credit card data.
Alert level: severe