Question:
how would i know if i had the zeus trojan on my computer?
Sarah
2010-08-12 03:37:49 UTC
when i search on yahoo and leave the page on for a while whilst opening up and using another wepage when i go back to the yahoo search and click on what is an official page it redirects to a advertising page. do i have malware on my computer or the zeus trojan? i do a lot of internet banking and frightened of opening my accounts incase it takes my passwords and apparently it prents fake webpages so you would not be able to tell if someone has taken your money.
Six answers:
2010-08-13 02:47:36 UTC
You do not have a trojan or malware on your PC, instead you have the "Search Redirect Virus". This virus acts like it's name suggests, it will redirect your search results to dodgy websites, usually advertisements. The awkward thing about this virus is that is cannot be detected by your normal anti virus.



This is because how the virus operates. Normally, the virus would work by installing some malicious software (malware) or run a harmful process (trojan), which the anti virus would detect and remove. However, the redirect virus doesn't do either, it infects a few system files and changes their settings slightly. This let's it effectively hide from the anti virus.



The system file it infects is related to the way the system handles the redirect requests from major search engines, such as Yahoo or Google. They all operate under the same protocol, by sending these redirect requests. However, since the system file was infected, these are manipulated to send you to fake websites.



This virus could leave you open for more deadly infections, which could steal your bank account details. You should therefore remove it as soon as possible and this can be done via a program called ComboFix. This program has worked for me countless times, however it is a professional software so requires a tutorial, one such one can be found here:



http://www.personalcomputerfixes.com/spyware/how-to-remove-the-google-redirect-virus/
?
2016-08-29 10:01:36 UTC
2
2010-08-15 04:31:14 UTC
If you use Windows to do any monetary work over the Internet, it doesn't matter.

You could, at any time be compromised by a keylogger and not know it.



No monetary work should be conducted using Windows...it's plagued with so many known and unknown problems, even the best informed and diligent user is rolling the dice.



Banking Trojans or keyloggers, prolific & readily installed via several vectors, can and do clean out bank accounts.

(see: Krebs on Security: http://www.krebsonsecurity.com/2010/01/money-mules-helped-to-rob-w-va-bank/

Also "Krebs on Security": eBanking Victim? Take a Number.

http://www.krebsonsecurity.com/2010/03/ebanking-victim-take-a-number/

"...if your bank doesn’t offer multi-factor authentication or transaction confirmation that’s out-of-band, ►►use a locked-down, dedicated workstation [or Operating System] for nothing but accessing your bank website or use a live boot distro. Or acknowledge that you’re playing Russian roulette..."

("Out of band" means using a second, non-Internet based communication, like telephone, to verify the transaction).



The single best strategy you can have is to use a solo partitioned Linux OS (like Ubuntu) for all Internet facing applications, like browsing & mail; not just banking. Then if you happen to pick up Windows targeted malware, it can't compromise your personal/sensitive data.

Use Windows for all your "in-house" work, but do not have ANY personal/banking data saved to it.
?
2010-08-15 03:44:38 UTC
Trojan horses are designed to allow a hacker remote access to a target computer system. Once a Trojan horse has been installed on a target computer system it is possible for a hacker to access it remotely and perform operations. The operations that a hacker can perform are limited by user privileges on the target computer system and the design of the Trojan horse itself.



Operations which could be performed by a hacker on a target computer system include:



Use of the machine as part of a Botnet (e.g. to perform Distributed Denial-of-service (DDoS) attacks)

Data Theft (e.g. passwords, security codes, credit card information)

Installation of software (including other malware)

Downloading of files

Uploading of files

Deletion of files

Modification of files

Keystroke logging

Viewing the user's screen

http://spyware-chk.com/Trojan/
2014-07-26 21:14:14 UTC
Ehm..

If you want to clean your pc and make it faster and more secure use Ccleaner. It's free and ot works like a charm. Download it from here http://bit.ly/UrArJo

I have been using it for years

Cheers.
G
2010-08-12 14:42:57 UTC
Its probably a browser hijacker. Scan your PC with Superantispyware free edition.

http://www.superantispyware.com/download.html

Use the full scan option.



Malwarebytes free version.

http://www.malwarebytes.org/

Use the quick scan option.


This content was originally posted on Y! Answers, a Q&A website that shut down in 2021.
Loading...