Backdoor Trojan Antivirus

  • Backdoor.Trojan is a detection name used by Symantec to identify malicious software programs that share the primary functionality of enabling a remote attacker to.
  • What is a Trojan Virus. - Definition. A Trojan horse or Trojan is a type of malware that is often disguised as legitimate software. Trojans can be employed by cyber.
  • A backdoor program is a Trojan specifically designed to allow malicious users to remotely manipulate affected systems. Like all Trojans, backdoors do not.
  • A backdoor Trojan may pose as legitimate software to fool users into running it. Alternatively as is increasingly common users may unknowingly allow Trojans onto.

Remove Backdoor Generic virus. AVG experts can remotely detect and remove any viruses or spyware which can root themselves deeply in your PC.

Backdoors

backdoor trojan antivirus

Trusted Anti-Virus, Identity Management, and Privacy Protection

McAfee Free Trial Renewal Policy

Our McAfee Always On ProtectionTM enables subscribers to continue receiving uninterrupted protection from McAfee security services.

Simply enter a credit card number when setting up your account. Nothing will be charged to your credit card today. 7 days before your 30-day trial

period ends we will apply a special 50 discount and charge your card at an introductory rate of 49.99 plus applicable taxes so that you can stay

protected with McAfee All Access for an additional 12 months. We will also send you a notification email so you will always have access to your renewal

details. If for any reason you are not completely happy with our product, you can turn off the auto-renewal feature, and your credit card will not be

Comprehensive protection for all your PCs, Macs, smartphones, and tablets with the convenience of a single subscription.

Guard against the latest threats - block viruses, malware, ransomeware, spyware, unwated programs, and more.

Ensure your children have a safe online experience and your family is protected from the latest online threats.

Trusted anti-virus, identity management, and privacy protection for every device

Trusted anti-virus and identity management for every device

Standard protection to shield your PC from online threats.

License s is are for personal use on all supported devices you own for the duration of your subscription. Not all features are available for all operating systems; see system requirements for supported devices.

Copyright 2003-2015 McAfee, Inc. All Rights Reserved.

McAfee All Access

Total Backdoors parasites in our DB: 150

WHAT IS BACKDOOR.A backdoor is a malicious computer program or particular means that provide the attacker with unauthorized remote access to a compromised system exploiting vulnerabilities of installed software and bypassing normal authentication. A backdoor works in background and hides from the user. It is very similar to a virus and therefore is quite difficult to detect and completely disable. More

A backdoor is one of the most dangerous parasite types, as it allows a malicious person to perform any possible actions on a compromised computer. The attacker can use a backdoor to spy on a user, manage files, install additional software or dangerous threats, control the entire system including any present applications or hardware devices, shutdown or reboot a computer or attack other hosts. Often a backdoor has additional harmful capabilities like keystroke logging, screenshot capture, file infection, even total system destruction or other payload. Such parasite is a combination of different privacy and security threats, which works on its own and doesn t require to be controlled at all.

Most backdoors are autonomic malicious programs that must be somehow installed to a computer. Some parasites do not require the installation, as their parts are already integrated into particular software running on a remote host. Programmers sometimes left such backdoors in their software for diagnostics and troubleshooting purposes. Hackers often discover these undocumented features and use them to break into the system.

Generally speaking, backdoors are specific trojans, viruses, keyloggers, spyware and remote administration tools. They work in the same manner as mentioned viral applications do. However, their functions and payload are much more complex and dangerous, so they are grouped into one special category. Navigate to Backdoor parasites

WAYS OF INFECTIONOnly few backdoors are able to propagate themselves and infect the system without user knowledge. Most parasites must be manually installed as any other software with or without user consent. There are four major ways unsolicited threats can get into the system.

1. Typical backdoors can be accidentally installed by incautious and unaware users. Some backdoors come attached to e-mail messages or are downloaded from the Internet using file sharing programs. Their authors give them unsuspicious names and trick users into opening or executing such files.

2. Backdoors often are installed by other parasites like viruses, trojans or even spyware. They get into the system without user knowledge and consent and affect everybody who uses a compromised computer. Some threats can be manually installed by malicious local users who have sufficient privileges for the software installation. Few backdoors are able to spread by exploiting remote systems with certain security vulnerabilities.

3. Several backdoors are already integrated into particular applications. Even legitimate programs may have undocumented remote access features. The attacker needs to contact a computer with such software installed in order to instantly get full unauthorized access to the system or take over control over certain software.

4. Some backdoors infect a computer by exploiting certain software vulnerabilities. They work similarly to worms and automatically spread without user knowledge. The user cannot notice anything suspicious, as such threats do not display any setup wizards, dialogs or warnings.

Widely spread backdoors affect mostly computers running Microsoft Windows operating system. However, lots of less prevalent parasites are designed to work under different environments. WHAT A BACKDOOR DOES.- Allows the intruder to create, delete, rename, copy or edit any file, execute various commands, change any system settings, alter the Windows registry, run, control and terminate applications, install arbitrary software and parasites.

- Allows the attacker to control computer hardware devices, modify related settings, shutdown or restart a computer without asking for user permission.

- Steals sensitive personal information, valuable documents, passwords, login names, identity details, logs user activity and tracks web browsing habits.

- Records keystrokes a user types on a computer s keyboard and captures screenshots.

- Sends all gathered data to a predefined e-mail address, uploads it to a predetermined FTP server or transfers it through a background Internet connection to a remote host.

- Infects files, corrupts installed applications and damages the entire system.

- Distributes infected files to remote computers with certain security vulnerabilities, performs attacks against hacker defined remote hosts.

- Installs hidden FTP server that can be used by malicious persons for various illegal purposes.

- Degrades Internet connection speed and overall system performance, decreases system security and causes software instability. Some parasites are badly programmed, they waste too much computer resources and conflict with installed applications.

- Provides no uninstall feature, hides processes, files and other objects in order to complicate its removal as much as possible. EXAMPLES OF BACKDOORSThere are lots of different backdoors. The following examples illustrate how functional and extremely dangerous these parasites can be.

Litebot is a backdoor that allows the remote attacker to download and execute arbitrary files from the Internet. The parasite decreases overall system security by changing default Windows firewall settings. Litebot main files have random names, so it is quite difficult to detect and get rid of. The backdoor automatically runs on every Windows startup.

Remote Connection, also known as RedNeck, is a dangerous backdoor that gives the intruder full access to a compromised system. The parasite can shutdown or restart a computer, manage files, record user keystrokes, install and run various programs, take screenshots and perform other malicious actions.

Tixanbot is an extremely dangerous backdoor that gives the remote attacker full unauthorized access to a compromised computer. The intruder can manage the entire system and files, download and install arbitrary applications, update the backdoor, change Internet Explorer default home page, attack remote hosts and obtain system information. Tixanbot terminates running essential system services and security-related processes, closes active spyware removers and deletes registry entries related with firewalls, antivirus and anti-spyware software in order to prevent them from running on Windows startup. The parasite also blocks access to reputable security-related web resources. Tixanbot can spread. It sends messages with certain links to all MSN contacts. Clicking on such a link downloads and installs the backdoor.

Resoil FTP is a backdoor that gives the hacker remote unauthorized access to an infected computer. This parasite runs a hidden FTP server, which can be used to download, upload and run malicious software. Resoil FTP activity may result in noticeable computer performance loss and user privacy violation. CONSEQUENCES OF A BACKDOOR INFECTIONA backdoor allows the attacker to work with an infected computer as with its own PC and use it for various malicious purposes or even criminal offences. The responsibility for such activity is usually assumed by guiltless users on which systems backdoors were installed, as in most cases it is really hard to find out who was controlling a parasite.

Practically all backdoors are very difficult to detect. They can violate user privacy for months and even years until the user will notice them. The malicious person can use a backdoor to find out everything about the user, obtain and disclose priceless information like user s passwords, login names, credit card numbers, exact bank account details, valuable personal documents, contacts, interests, web browsing habits and much more.

Backdoors can be used for destructive purposes. If the hacker was unable to obtain any valuable and useful information from an infected computer or have already stole it, he eventually may destroy the entire system in order to wipe out his tracks. This means that all hard disks would be formatted and all the files on them would be unrecoverably erased. HOW TO REMOVE A BACKDOOR.Backdoors work in the same manner as the computer viruses and therefore can be found and removed with the help of effective antivirus products like Symantec Norton AntiVirus, Kaspersky Anti-Virus, McAfee VirusScan, eTrust EZ Antivirus, Panda Titanium Antivirus, AVG Anti-Virus. Some advanced spyware removers, which are able to scan the system in a similar way antivirus software does and have extensive parasite signature databases can also detect and remove certain backdoors and related components. Powerful anti-spyware solutions such as Spyware Doctor, Microsoft AntiSpyware Beta, Spybot - Search Destroy, Ad-Aware SE, SpyHunter, eTrust PestPatrol are known for quite fair backdoor detection and removal capabilities.

In some cases even an antivirus or spyware remover can fail to get rid of a particular backdoor. That is why there are Internet resources such as 2-Spyware.com, which provide manual malware removal instructions. These instructions allow the user to manually delete all the files, directories, registry entries and other objects that belong to a parasite. However, manual removal requires fair system knowledge and therefore can be a quite difficult and tedious task for novices.

know or you have a website or page about Backdoors removal, feel free

It is very hard to fight Computer parasites alone in internet space. If you have a website we would be more than happy if you would help us to spread the knowledge about latest threats. You can help your

visitors to manage their Computer system manually without aditional expences. Knowledge is the power, we just need to spread it.

September 23rd, 2005 No Comments

Brakkeshell is a dangerous backdoor that gives the attacker unauthorized remote access to a compromised computer. The pa

November 23rd, 2005 No Comments

Chast is a backdoor that provides the attacker with unauthorized remote access to a compromised computer. The intruder c

November 1st, 2005 No Comments

Civcat is a backdoor that gives the attacker unauthorized remote access to a compromised computer. Once executed, the pa

December 17th, 2005 No Comments

Clown is an IRC-controlled backdoor that provides the attacker with unauthorized remote access to a compromised computer

December 4th, 2005 No Comments

Clunky is a backdoor that provides the attacker with unauthorized remote access to the compromised computer. The intrude

January 12th, 2006 No Comments

ColdFusion.b is a backdoor designed to record all user keystrokes and send gathered data to a predefined e-mail addre

October 21st, 2006 No Comments

Conway is a backdoor that provides the attacker with unauthorized remote access to the compromised computer. The intrude

October 29th, 2005 No Comments

Cosdoor is a backdoor that gives the attacker unauthorized remote access to a compromised computer. The intruder can use

Crow is a backdoor that provides the attacker with unauthorized remote access to the compromised computer. The intruder

September 27th, 2005 No Comments

Dagonit is a dangerous backdoor that gives the remote attacker full unauthorized access to the compromised computer. Onc

November 16th, 2005 No Comments

Danrit is a dangerous backdoor that provides the attacker with unauthorized remote access to a compromised computer. The

Darkmoon is a dangerous backdoor with keylogging capabilities. The parasite gives the remote attacker full unauthorized

October 22nd, 2005 No Comments

Darkmoon.b is a dangerous backdoor with keylogging capabilities. The parasite gives the remote attacker full unauthor

Dasda is a backdoor that gives the remote attacker unauthorized access to a compromised computer. The malicious person c

Daserf is a backdoor that provides the attacker with unauthorized remote access to the compromised computer. The intrude

December 28th, 2005 No Comments

Dckane is a backdoor that provides the attacker with unauthorized remote access to a compromised computer. The intruder

December 2nd, 2005 No Comments

Disgu is a backdoor that provides the attacker with unauthorized remote access to the compromised computer. The intruder

January 29th, 2006 No Comments

Dragodor is a backdoor that provides the attacker with unauthorized remote access to the compromised computer. The intru

September 22nd, 2005 No Comments

DTR is a dangerous backdoor that gives the remote attacker full unauthorized access to a compromised computer. DTR allow

EasyServ is a backdoor that gives the attacker unauthorized remote access to a compromised computer. The threat runs a w

Homutex is a backdoor that gives the remote attacker full unauthorized access to a compromised computer. It also monitor

September 12th, 2005 No Comments

Hugesot is a backdoor that gives the remote attacker unauthorized access to a compromised computer. The malicious person

Hzdoor is an IRC-controlled backdoor that provides the attacker with unauthorized remote access to the compromised compu

October 24th, 2006 No Comments

Imoni is a backdoor that provides the attacker with unauthorized remote access to the compromised computer. It allows th

October 27th, 2006 No Comments

Imoni.b is a backdoor that provides the attacker with unauthorized remote access to the compromised computer. It allows

Jumbot is an IRC-controlled backdoor that provides the attacker with unauthorized remote access to the compromised compu

February 1st, 2006 No Comments

Kookoo is a viral backdoor that infects files and spreads via them. The parasite provides the attacker with unauthorized

Lassrv.b is a backdoor that provides the attacker with unauthorized remote access to the compromised computer. The intru

Litebot is a dangerous backdoor that allows the remote attacker to download and execute arbitrary files from the Interne

Litmus is a dangerous backdoor that gives the attacker remote unauthorized access to a compromised computer. The parasit

Loksky is a backdoor that provides the attacker with unauthorized remote access to the compromised computer. The intrude

September 29th, 2005 No Comments

Malpayo is a backdoor that gives the attacker unauthorized remote access to a compromised computer. It allows the intrud

January 10th, 2006 No Comments

Masot is a backdoor, which provides the attacker with unauthorized remote access to the compromised computer. The intrud

Mepcod is a backdoor that gives the attacker remote unauthorized access to a compromised computer. It also contacts a pr

Metalrock, also known as Tastyred, is a backdoor that gives the attacker unauthorized remote access to a compromised com

Microkos is a dangerous backdoor that allows the remote attacker to have full unauthorized access to a compromised syste

MindControl is an extremely dangerous backdoor that gives the remote attacker full unauthorized access to the infected c

January 14th, 2006 No Comments

Mipbot.b, also known as Rustock, is a backdoor that runs a hidden proxy server on the compromised computer. This prox

Mire is a dangerous backdoor, which gives the remote attacker full unauthorized access to a compromised computer. It all

Mlsuc is a backdoor that provides the attacker with unauthorized remote access to the compromised computer. The intruder