Trojan Horse Swarm 3 million computer victims

Source: Internet
Author: User

Intermediary transaction http://www.aliyun.com/zixun/aggregation/6858.html ">seo diagnose Taobao guest stationmaster buy cloud host technology Hall

The latest flash vulnerabilities are being exploited by tens of thousands of Trojan horses to perform massive attacks on computers. Yesterday, the security manufacturer issued an emergency red (first level) security alert said, "Trojan Group" virus using the latest Flash vulnerability intrusion user computers, and guide tens of thousands of kinds of Trojan virus to attack the computer poisoning. According to the monitoring and measurement, there are more than 3 million computers have been "Trojan group" attacks, poisoned computers will appear anti-virus software is closed, the system time is modified, commonly used procedures are deleted, online network of silver and QQ account password and other passwords stolen and other symptoms.

Rising anti-virus experts said that the system vulnerabilities only threaten a single operating system, browsers and so on. The flash flaw ignores the difference between the operating system and the browser. According to statistics, more than 60% of users currently have this vulnerability.

At present, the domestic mainstream security manufacturers have targeted the launch of the "Trojan cluster virus killing and repair Tools", computer users can download in time to kill.

Computer is "Trojan Group" virus infection after symptoms

1, antivirus software main program can not be opened or opened after no response;

2. Abnormal shutdown of monitoring program;

3, the system date is forced to change;

4, firewall warning, abnormal program Access network;

5, the local area network ARP attack;

6, the virus repeatedly killing is not clean;

7, the desktop shortcut icon into a blank box (this is because the icon points to the exe file was deleted by virus);

8, security software or security monitoring tools can not be used (such as process viewing tools, system optimization tools, etc.);

9. The system registry is constantly being written to hijack.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.