Panda Security has warned the users that virus developers have employed a good name Panda for their malicious purposes. Trojan uses their name for infecting computers. Panda Trojan is capable of logging all commands entered by the users into the affected computer - including, of course, personal, financial and login information - and sends it to a remote server controlled by cyber crooks. It is also able to load itself up after every computer reboot, and uses stealth techniques to prevent being detected by antivirus products.
Trojan pretends to be as Panda Cloud Antivirus and installs into an infected computer as the DarkAngle Trojan. The file is named 2.4.exe. This malware is able to launch after every computer reboot. Special stealth techniques protect it from being detected by computer security. In order to prevent being infected by this and other malware, users should get used to downloading all software from the developers' official of Facebook pages, and from reputable download sites.
SOURCE: http://remove-trojans.com/panda-trojan-beware-of-it/
Комментариев нет:
Отправить комментарий