Backdoor HuPigeon YII Trojan
Infected with Backdoor HuPigeon YII Trojan ?
The Backdoor HuPigeon YII Trojan application is a remote application program.
The effects of the Backdoor HuPigeon YII Trojan application on the computer and its user reputedly include entry of even more security threats because of the presence of a backdoor and the possibility that security programs such as antivirus software could become ineffective. There is also a possible violation of the user's privacy because of the exposure of confidential files and pieces of information to remote users and the possibility that the user will become a victim of theft, blackmail, harassment, and other criminal activities. It can also purportedly cause slowing down of the computer system because of the increasing number of unwanted and hidden programs running in the background.
The Backdoor HuPigeon YII Trojan application is very high at risk because it permits an intruder to control remotely the computer it infects. An individual that employs this Trojan for remote access could possibly download files to the infected computer, delete important files and programs such as antivirus software, or instruct the computer to collaborate with other computers in a botnet for a Web attack to disable Internet access for a particular Web server.
The intruder can also possibly utilize the compromised computer to send out unsolicited emails or distribute adware, spyware, and other Trojans. The Backdoor HuPigeon YII Trojan application could serve as a means for gaining access to the user's credit card and bank account information, passwords, and other pieces of personal data. The intruder can also read the files contained in the victim's computer, including his or her emails.
The Backdoor HuPigeon YII Trojan application allegedly gains entry into a computer that links to its host rigged for this malicious purpose. The main page of this website contains a script program executed when the computer that connects to the site allows the running of scripts. Once inside the computer, it reputedly establishes a backdoor that could cause other more dangerous threats.
|Threat Level: Severe Risk|
|Records personal data / keystrokes|
|Hijacks internet browser|
|Allows remote influence|
|Downloads unsolicited files|
|Disables programs / system|
|Makes unauthorized phone calls|
|Exploits a security flaw|
|Floods internet connection|
|Tracks browsing activity with installed applications|
|Tracks browsing activity with cookies|
|Installs without user consent|
|Inadequate uninstall procedures|
|Insufficient privacy disclosure and consent|
|Uses excessive system resources|
|Makes fraudulent claims about spyware detection and removal|
|Performs Silent Updates|
Microsoft is a registered trademark of Microsoft Corporation in the United States and/or other countries.