Remove Invitation from Your Computer - How to, Technology and PC Security Forum |

Remove Invitation from Your Computer

BlackPOS, FrameworkPOS & BackoffPOS Malware AttacksInvitation is a corrupted file attached to a scam email message containing an invitation to the social networking site The file contains a worm that security solutions detect as W32.Ackantta.B@mm.

The Invitation email reads:

Subject: Your friend invited you to twitter!”

How Does Invitation Operate?

Once the user opens the malicious attachment, the worm is launched and starts copying itself to every shared folder and removable drive on the affected machine. Its main purpose is to infect as many computers as possible. It is possible that the worm will download a Trojan on the infected PC. In most cases, the Trojan in question is Trojan Vundo.

Invitation Symptoms:

  • The Invitation has browser settings changing capabilities
  • May lead to adware infiltration, which results in unwanted advertisements popping up in the web pages you view
  • Invitation stays resident in the background

How to Remove Invitation from Your Computer?

Deleting Invitation manually requires a high level of technical knowledge. Security experts strongly recommend removing the worm by using a competent anti-malware tool.


Spy Hunter FREE scanner will only detect the threat. If you want the threat to be automatically removed, you need to purchase the full version of the anti-malware tool. Find Out More About SpyHunter Anti-Malware Tool


Berta Bilbao

Berta is a dedicated malware researcher, dreaming for a more secure cyber space. Her fascination with IT security began a few years ago when a malware locked her out of her own computer.

More Posts

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Share on Twitter Tweet
Share on Google Plus Share
Share on Linkedin Share
Share on Digg Share
Share on Reddit Share
Share on Stumbleupon Share