Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Vigilante Erazer Trojan


  • Please log in to reply
1 reply to this topic

#1 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 50,606 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:11:57 PM

Posted 17 May 2006 - 08:11 AM

Here's a first: a Trojan horse that actually helps security pros do their jobs.

Analysts at SophosLabs...have discovered a spyware-borne Trojan, dubbed Troj/Erazer-A, that seeks out and destroys movie and music files that it suspects to be illegal copies transmitted via peer-to-peer (P2P) file sharing networks..."The Erazer Trojan is a vigilante worthy of a Charles Bronson movie, taking the law into its own hands...Trojan Erazer could be dangerous because it tries to turn off antivirus applications and other security tools...its methods are worrisome because it deletes files, steals information, adds itself to the registry, and then drops more malware on the target system.

darkreading.com
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

BC AdBot (Login to Remove)

 


m

#2 Elendil

Elendil

  • Members
  • 660 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:The US
  • Local time:12:57 AM

Posted 17 May 2006 - 02:50 PM

Interesting! A double edged sword. Do you leave it and watch it partially clean your computer, or do you delete it and stop it from working its counter-part malvolence? Personally, if it's malware I'm deleting it regardless of its actions. :thumbsup:
Stanford '14
B.S. Candidate | Computer Science




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users