Port No | 7274 |
Service Name | AutoSpY |
RFC Doc | 0 |
Protocol | TCP |
Description | This backdoor malware, written and compiled in Visual Basic, has a client component and a server component. The server component infects a target system and hackers use the client component to access and control the infected system. Apart from compromising network security, this remote access backdoor enables a hacker with the client program to delete files and folders from an infected system. |
Reference Link | AutoSpY Trojan |
Attack |
SOLUTION : 1.Launch the Registry Editor. Click Start>Run, type REGEDIT then hit the Enter key. 2.In the left panel, double click the following: HKEY_CURRENT_USER>Software>Microsoft>Windows CurrentVersion>Run 3.In the right panel, locate and delete the entry named: MsUpdate 4.Again in the left panel, double click the following: HKEY_USERS>DEFAULT>Software>Microsoft>Windows >CurrentVersion>Run 5.In the right panel, locate and delete the entry named: MsUpdate 6.Restart your system. 7.Scan your system with Trend Micro antivirus and delete all files detected as BKDR_AUTOSPY.A. To do this Trend Micro customers must download the latest pattern file and scan their system. Other email users may use HouseCall, Trend Micro's free online virus scanner. |
Catch threats immediately
We work side-by-side with you to rapidly detect cyberthreats
and thwart attacks before they cause damage.