Liveinternet html scrinject b trojan program. We keep the computer clean or clean the PC from Trojans manually. What can I do to protect my system?

Today, the NOD32 update was released, which began to suspect many sites of being infected with a Trojan.

Please read the official response from NOD32 and take the necessary actions:

Information for home users.

To roll back the virus signature database to previous version, please do the following:

1) Open the antivirus window, press F5 to access advanced options. Select the Update section.

2) In the General subsection, click the Rollback button, select the duration of 12 hours and click OK twice to exit to the main menu of the program.

After 12 hours, the virus signature database will be updated to new version and further updates will occur as usual. If it helped, give it a like!

Information for corporate users.

If you are using 6th ESET version for corporate users, updates can be rolled back through ERA: Client tasks – Signature database update rollback – Create.

If you are using ESET Enterprise version 5, you can roll back updates through ERA: New task – Virus database rollback task:

The task must be applied to all client PCs.

In previous articles in the computer cleaning series, we talked about two things: how to clean the inside of your PC from dust, and how to prevent infection when installing and configuring programs.

advertising

But there are also cases when some nasty thing has already gotten through. Therefore, based on requests from the audience, we decided to talk about it. So, what to do if you didn’t pay attention and something harmful ended up on your computer? And why?

Are you infected?

... There is still a popular opinion in the category of “if you don’t install antiviruses, then there won’t be any viruses.” It is unnecessary to say that this, to put it mildly, is far from the truth - of course, if we are talking about a Windows computer, and Windows is installed on the vast majority of PCs and laptops. Of course, by installing Linux, you will automatically save yourself from tens of thousands of Trojans, but in terms of convenience, this OS is still far from Windows, even with all its undeniable advantages.

Yes, there will be viruses, but not only them: various Trojans, malicious codes, phishing sites and adware programs... And there is no end in sight to this, on the contrary - every year the number of people wishing to do harm increases exponentially. Remember what happened at least ten years ago: there was no such abundance of nasty things.

Having an "expensive and super-duper-cool" antivirus package - or Internet Security package - will never protect you 146% from everything. Adware (advertising infections) and malware (Trojans, etc.) have already learned how to penetrate a computer, bypassing all protections, and no matter how tough a system administrator you are, don’t get arrogant: in the author’s memory, even the most seasoned users have been miserably pierced. And why all?

Because no protection will save you from the “gasket between the keyboard and the chair”: from the average user.

ESET is a leader in antivirus software development. software- reports that in June, using the ThreatSense.Net rapid alert system, increased activity of the Trojan program JS/TrojanDownloader.Pegel.BR was recorded.
This malware is a script that is added to web pages and automatically redirects visitors to infected sites. After this, malicious code is downloaded and executed on unprotected computers. This threat, referred to by ESET specialists as JS/TrojanDownloader.Pegel.BR, is spreading across Europe at a very fast pace. In percentage terms relative to the total number of infected computers, its share is already 2.29%, which has given the Trojan fifth place in the global threat rankings. Despite the fact that the JS/TrojanDownloader.Pegel.BR malware has not yet spread in Ukraine, ESET experts strongly recommend that Ukrainian users be extremely careful when downloading files from the Internet, and also update ESET NOD32 Antivirus and ESET products Smart Security up to version 4.2 to ensure maximum computer protection.
The Conficker family continues to be active in June. Win32/Conficker has held the top spot among malware in global (9.79%) and Ukrainian (19.42%) threat ratings for a month now. This network worm spreads through a vulnerability in the Windows operating system, which is located in the remote procedure call (RPC) subsystem, as well as through unprotected public folders and removable storage media. The INF/Conficker threat, another representative of the well-known family, also remains widespread. Using the autorun.inf file, this malware distributes the latest variations of the Conficker worm to infect PCs. The large number of infected computers around the world and in Ukraine as well (1.47% and 1.66%, respectively) provides this threat with a leading position in malware ratings.
ESET specialists strongly recommend that users reliably protect their personal data, as threats such as Win32/Agent, Win32/PSW.OnLineGames and Win32/Tifaut, designed to steal confidential information, are not losing their positions. Users should also beware of the INF/Autorun malware, which uses the autorun feature on removable storage media and launches malicious programs every time the removable storage media is connected to the computer, as well as last month’s “new product” - Win32/Sality, which is a polymorphic virus that modifies EXE and SCR files and disables antivirus programs.
The beginning of summer could not help but please users with new viruses. The TOP 10 of the global threat rating in June includes two “new products” - Win32/Qhost (1.16%) and HTML/ScrInject.B (0.84%). The Win32/Qhost Trojan is distributed using Email and gives hackers access to the infected computer. Before running, this threat copies itself to Windows folder%system32%, after which it modifies the host file in order to redirect traffic to the attacker’s domains. HTML/ScrInject.B threat detects HTML web pages with a confusing script or IFRAME tags, which automatically redirect to download malware.
According to ESET experts, due to the increase in Internet fraud and the complexity of virus writing technologies, users should be extremely careful when surfing the Internet, as well as when using removable media information. To effectively protect personal data and confidential information, ESET experts recommend regularly updating operating system, as well as use reliable anti-virus solutions with up-to-date signature databases that can provide comprehensive computer protection.

In previous articles in the computer cleaning series, we talked about two things: how clean PC from dust inside, and how prevent infection when installing and configuring programs.

advertising

But there are also cases when some nasty thing has already gotten through. Therefore, based on requests from the audience, we decided to talk about it. So, what to do if you didn’t pay attention and something harmful ended up on your computer? And why?

Are you infected?

... There is still a popular opinion in the category of “if you don’t install antiviruses, then there won’t be any viruses.” It is unnecessary to say that this, to put it mildly, is far from the truth - of course, if we are talking about a Windows computer, and Windows is installed on the vast majority of PCs and laptops. Of course, by installing Linux, you will automatically save yourself from tens of thousands of Trojans, but in terms of convenience, this OS is still far from Windows, even with all its undeniable advantages.

Yes, there will be viruses, but not only them: various Trojans, malicious codes, phishing sites and adware programs... And there is no end in sight to this, on the contrary - every year the number of people wishing to do harm increases exponentially. Remember what happened at least ten years ago: there was no such abundance of nasty things.

Having an "expensive and super-duper-cool" antivirus package - or Internet Security package - will never protect you 146% from everything. Adware (advertising infections) and malware (Trojans, etc.) have already learned how to penetrate a computer, bypassing all protections, and no matter how tough a system administrator you are, don’t get arrogant: in the author’s memory, even the most seasoned users have been miserably pierced. And why all?

Because no protection will save you from the “gasket between the keyboard and the chair”: from the average user.