Check Point Advisories

Update Protections against Recent Malware Threats (3-Jul-08)

Check Point Reference: CPAI-2008-089
Date Published: 3 Jul 2008
Severity: High
Last Updated: Tuesday 01 January, 2008
Source: Spyware: Zwinky
Trojan Downloader: Wintrim.z
Spyware: BitRoll 5.0
Protection Provided by:
Who is Vulnerable? Microsoft Windows clients
Vulnerability Description Malware is a software designed to infiltrate or damage a computer system without the owner's informed consent. It is a general name for a variety of forms of hostile, intrusive, or annoying programs like Viruses, worms, Adware, Trojans, and spyware that exploit unprotected clients, using network access to intrude upon organizations, destroying or stealing data.

Spyware is computer software that is installed without the user's informed consent on a personal computer to intercept or take partial control over the user's interaction with the computer. Spyware programs can collect various types of personal information, install additional software, redirect Web browser activity, or divert advertising revenue to a third party.

Adware is an advertising-supported software package which automatically plays, displays, or downloads advertising material to a computer after the software is installed on it or while the application is being used.

A Trojan horse is a program that installs malicious software while under the guise of doing something else.  Trojans are known for installing backdoor programs which allow unauthorized non permissible remote access to the victim's machine by unwanted parties with malicious intentions.

Vulnerability DetailsThe update includes new protections against 3 recent malware threats:

Spyware: Zwinky - Zwinky is a spyware downloader that installs malware such as MyWebSearch and also sets tracking cookies on the user's machine.

Trojan Downloader: Wintrim.z - Wintrim.z is a Trojan downloader program which downloads and executes other malware software on a user's computer without user permission.

Spyware: BitRoll 5.0 - BitRoll 5.0 hijacks the user's Internet Explorer home page and auto search and delivers unwanted advertisements.

Protection Overview

×
  Feedback
This website uses cookies for its functionality and for analytics and marketing purposes. By continuing to use this website, you agree to the use of cookies. For more information, please read our Cookies Notice.
OK