Port No | 334 |
Service Name | VC |
RFC Doc | 0 |
Protocol | TCP |
Description | This Backdoor malware is similar to the BACK ORIFICE and TROJ_SUBSEVEN. This is the server side of a hacking tool, which enables a remote hacker access to an infected computer via the Internet. This backdoor program modifies registry to activate itself during boot up. It compromises network security since it gives system administrator privileges to a remote user. |
Reference Link | VC |
Attack | Solutions: Click the START button and select RUN Type REGEDIT and click the OK button On the left window, expand the following registry entries by clicking the box with a ‘+’ in it beside that entry: HKEY_CURRENT USERS Software Microsoft Windows CurrentVersion Run On the right window, click the value "SysDat" and press the DELETE key. Click YES when prompted. On the left window, expand the following registry entries by clicking the box with a ‘+’ in it beside that entry: HKEY_USERS .DEFAULT Software Microsoft Windows CurrentVersion Run On the right window, click the value "SysDat" and press the DELETE key. Click YES when prompted. Reboot the system Scan your system with Trend antivirus and delete all files detected as BKDR_VC. To do this Trend customers must download the latest pattern file and scan their system. Other email users may use Trend HouseCall, a free online virus scanner |
Catch threats immediately
We work side-by-side with you to rapidly detect cyberthreats
and thwart attacks before they cause damage.