Verwijder Revenge Trojan van uw pc
BEDREIGING VERWIJDEREN

Verwijder Revenge Trojan van uw pc

The Revenge Trojan is een gevaarlijk wapen gebruikt tegen computer gebruikers wereldwijd. Het infecteert voornamelijk via geïnfecteerde software installateurs. Ons artikel geeft een overzicht van zijn gedrag in overeenstemming met de verzamelde monsters en beschikbare rapporten, Ook kan het nuttig zijn in een poging om het virus te verwijderen.

bedreiging Samenvatting

NaamRevenge Trojan
TypeTrojaans
Korte OmschrijvingThe Revenge Trojan is a computer virus that is designed to silently infiltrate computer systems.
SymptomenDe slachtoffers mag geen zichtbare symptomen van een infectie.
Distributie Methodesoftware beveiligingslekken, Freeware Installations, gebundelde pakketten, Scripts en anderen.
Detection Tool See If Your System Has Been Affected by Revenge Trojan

Download

Malware Removal Tool

GebruikerservaringWord lid van onze Forum to Discuss Revenge Trojan.

Revenge Trojan – Distribution Methods

The Revenge Trojan has been spotted in a recent attack campaign. An unknown hacker collective is behind the ongoing attacks, at the moment there is no information about their identity. The captured samples were identified as malware through one of the most common intrusion mechanisms — geïnfecteerde documenten. The virus installation code is made part of macros that are embedded in the payload documents, kunnen ze van één van de populaire types: tekstdocumenten, spreadsheets, presentaties en databases. Once they are opened by the victim users a prompt will appear asking the victims to enable the content. The window will usually state that this is required in order to view correctly the files.

What’s more dangerous is that other similar tactics can be employed as well. One of the common cases is when the hackers embed the virus installation instructions in software setup files. They target applications that are popularly downloaded by end users such as system utilities, creativiteit suites, Productiviteit en kantoor apps en etc.

Both the virus files themselves and these two payload types are usually spread through methods that can infect thousands of users at once. There are several methods such as the following:

  • E-mail spam-berichten — The hackers can craft phishing emails that appear notifications as being sent by legitimate services. This is done by using their own design layout and text body contents. The fake email phishing messages will link the files in text links or interactive contents. Alternatively they can be directly attached to the messages.
  • Kwaadwillige websites — A related strategy is to create web pages that imitate legitimate services, downloadportals, landingspagina's en etc. They are hosted on similar sounding domain names and in some cases utilizing stolen or hacker-generated security certificates.
  • File-Sharing Sites — Both the standalone files and infected payloads are widely available on networks like BitTorrent where both legitimate and pirate content is freely shared across Internet users.
  • Browser hijackers — Dangerous web browser plugins can be be made by the criminals that are made compatible with the most popular web browsers and uploaded to the relevant repositories. They are accompanied by fake user reviews and stolen or hacker-made developer credentials in order to confuse the victims into thinking that the extension is safe. Their descriptions will promise the addition of new features or performance optimizations.

Other tactics can additionally be used in forthcoming attacks and upcoming versions of the Revenge Trojan.

Revenge Trojan – Detailed Description

The Revenge Trojan appears to be an original creation which doesn’t use any code snippets from previous threats. At the time of writing this article there is information about the identity of the group behind the ongoing attacks. We presume that the threat is modular in nature and that various modules can be added to it.

The captured Revenge Trojan instance appears to launch a main engine which connects to a hacker-controlled server and allows the criminal operators to spy on the victims. Through this secure connection they have the ability to take over control of the affected machines, steal their data and carry out all sorts of malicious actions.

A PowerShell-based script is launched which allows all sorts of components to be added. Trojans such as this one usually all include a certain set of common behavior patterns. A list of them is the following:

  • Information Retrieval — The engine can be programmed to extract sensitive information that can be used to generate an unique ID that is specfiic to each individual computer. This is done by an algorithm that takes its input parameters from data sets such as the parts list of the installed hardware components, gebruikersinstellingen, regional preferences and other related metrics. The other dangerous mechanic used by Trojans is the exposure of personal information which is done by programming the strings to look for strings that contain directly reveal the victims. Common ones include their name, adres, telefoonnummer, belangen en eventuele opgeslagen accountreferenties. If the Trojan interacts with the Windows Volume Manager it can also search the removable storage devices and available network shares. The obtained data sets can be used for various crimes including identity theft, chantage en financieel misbruik.
  • Boot Options Wijziging — A popular mechanism that is made part of most Trojans, possibly including future Revenge Trojan variants, is the ability to modify the boot options and configuration files that will set it to automatically start once the computer is powered on. This can also disable most manual user recovery guides as they depend on access to recovery boot menus.
  • Windows Registry Changes — The Trojan module is capable of accessing the Registry records not only to create strings for itself but also to modify existing ones. If values that are used by the operating system are affected then the victim users will be unable to access certain services and may experience serious performance issues. Changes to strings used by third-party applications can lead to unexpected errors.
  • Removal of Sensitive Data — The engine can be programmed to locate and delete sensitive files that can seriously disrupt the usual recovery procedure. This is done by targeting System Restore Points, backups, Shadow Volume Copies and etc. In this case the victims will need to se a combination of a professional-grade anti-spyware utility and data recovery program.
  • Extra Payloads Delivery — The Revenge Trojan can be instructed to insert other malicious threats on the compromised machines.

Future Revenge Trojan campaigns can be instructed to carry out other actions as configured by the hackers.

Remove Revenge Trojan

Als uw computersysteem raakte besmet met het Revenge Trojan, moet je een beetje ervaring hebben in het verwijderen van malware. U dient zich te ontdoen van deze Trojan krijgen zo snel mogelijk voordat het de kans om verder te verspreiden en andere computers te infecteren kan hebben. U moet de Trojan te verwijderen en volg de stap-voor-stap instructies handleiding hieronder.

Aantekening! Uw computersysteem kan worden beïnvloed door Revenge Trojan en andere bedreigingen.
Scan uw pc met SpyHunter
SpyHunter is een krachtige malware removal tool is ontworpen om gebruikers te helpen met diepgaande beveiliging van het systeem analyse, detectie en verwijdering van Revenge Trojan.
Houd in gedachten, dat SpyHunter scanner is voor de detectie van malware. Als SpyHunter detecteert malware op uw pc, moet u SpyHunter's malware removal tool kopen om de malware-bedreigingen te verwijderen. Lezen onze SpyHunter 5 beoordeling. Klik op de bijbehorende links naar SpyHunter controleren EULA, Privacybeleid en Threat Assessment Criteria.

To remove Revenge Trojan Volg deze stappen:

1. Boot Your PC In Safe Mode to isolate and remove Revenge Trojan files and objects
2. Find files created by Revenge Trojan on your PC

Gebruik SpyHunter om te scannen op malware en ongewenste programma's

3. Scannen op malware en ongewenste programma's met SpyHunter Anti-Malware Tool

Martin Beltov

Martin studeerde af met een graad in de uitgeverij van de universiteit van Sofia. Als een cyber security enthousiast dat hij geniet van het schrijven over de nieuwste bedreigingen en de mechanismen van inbraak.

Meer berichten - Website

Volg mij:
TjilpenGoogle Plus

Laat een bericht achter

Uw e-mailadres wordt niet gepubliceerd. Verplichte velden zijn gemarkeerd *

Termijn is uitgeput. Laad CAPTCHA.

Delen op Facebook Aandeel
Loading ...
Delen op Twitter Gekwetter
Loading ...
Delen op Google Plus Aandeel
Loading ...
Delen op Linkedin Aandeel
Loading ...
Delen op Digg Aandeel
Deel op Reddit Aandeel
Loading ...
Delen op StumbleUpon Aandeel
Loading ...