The goal of this project is to make virtual world a safer and better place without child pornography, major computer crime and RIAA.
Login As
You can log in if you are registered at one of these services:
Security Bulletins
Latest Malware Updates

Infostealer.Posteal

02/26/2015

Downloader.Busadom

02/26/2015

Trojan.Ladocosm

02/26/2015

SONAR.SuspDocRun

02/25/2015

SONAR.SuspHelpRun

02/25/2015
01/01/1970

Adware.CWSAlfaSearch

Type:  Adware
Discovered:  01.01.1970
Updated:  13.02.2007
Affected systems:  Windows 2000, Windows 95, Windows 98, Windows Me, Windows NT, Windows Server 2003, Windows XP
AV Vendor:  Symantec

Description:


When Adware.CWSAlfasearch is executed, it performs the following actions:

  • Adds the values:

    "Start Page" = "[URL on the domain alfa-search.com]"
    "Use Search Asst" = "No"
    "Search Page" = "[URL on the domain alfa-search.com]"
    "Search Bar" = "[URL on the domain alfa-search.com]"

    to the registry key:

    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Main

    to change the Internet Explorer start page and search page settings.

  • Adds the values:

    "(Default)" = "[URL on the domain alfa-search.com]"
    "provider" = "god"

    to the registry key:

    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\SearchURL

    to change the Internet Explorer search page settings.

  • Adds the value:

    "SearchAssistant" = "[URL on the domain alfa-search.com]"

    to the registry key:

    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Search

    to change the Internet Explorer search page settings.

  • Adds the following lines to the Windows hosts file to redirect certain Web sites to the IP address 216.200.3.32:

    216.200.3.32     thehun.net
    216.200.3.32     www.thehun.net
    216.200.3.32     thehun.com
    216.200.3.32     www.thehun.com
    216.200.3.32     worldsex.com
    216.200.3.32     www.worldsex.com
    216.200.3.32     sexocean.com
    216.200.3.32     www.sexocean.com
    216.200.3.32     easypic.com
    216.200.3.32     www.easypic.com
    216.200.3.32     free6.com
    216.200.3.32     www.free6.com
    216.200.3.32     al4a.com
    216.200.3.32     www.al4a.com
    216.200.3.32     thumbnailpost.com
    216.200.3.32     www.thumbnailpost.com
    216.200.3.32     drbizzaro.com
    216.200.3.32     www.drbizzaro.com
    216.200.3.32     hoes.com
    216.200.3.32     www.hoes.com
    216.200.3.32     absolut-series.com
    216.200.3.32     www.absolut-series.com
    216.200.3.32     elephantlist.com
    216.200.3.32     www.elephantlist.com
    216.200.3.32     ah-me.com
    216.200.3.32     www.ah-me.com

  • Creates 4 adult-oriented shortcuts in the Internet Explorer Favorites menu, called [Random file name].url.

    The Favorites folder is located in one of the following locations:
    • %UserProfile%\Favorites (Win NT-based operating systems such as Windows 2000 or XP)
    • %Windir%\Favorites (Win 9x-based operating systems such as Windows 95/98/Me)

      Notes:
    • %Userprofile% is a variable that refers to the current user's profile folder. By default, this is C:\Documents and Settings\<Current User> (Windows NT/2000/XP).
    • %Windir% is a variable that refers to the Windows installation folder. By default, this is C:\Windows (Windows 95/98/Me/XP)or C:\Winnt (Windows NT/2000).


    Removal instructions from Symantec Security Response Team


    The following instructions pertain to all Symantec antivirus products that support Security Risk detection.

  • Update the definitions.
  • Run a full system scan.
  • Edit the hosts file.
  • Reset the Internet Explorer home page.
  • Reset the Internet Explorer search page.
  • Delete the Web sites added to the Internet Explorer Favorites menu.
    For specific details on each of these steps, read the following instructions.

    1. To update the definitions
    To obtain the most recent definitions, start your Symantec program and run LiveUpdate.

    2. To run a full system scan
  • Start your Symantec antivirus program, and then run a full system scan.
  • If any files are detected as Adware.CWSAlfaSearch and depending on which software version you are using, you may see one or more of the following options:

    Note: This applies only to versions of Norton AntiVirus that support Security Risk detection. If you are running a version of Symantec AntiVirus Corporate Edition that supports Security Risk detection, and Security Risk detection has been enabled, you will only see a message box that gives the results of the scan. If you have questions in this situation, contact your network administrator.
    • Exclude (Not recommended): If you click this button, it will set the threat so that it is no longer detectable. That is, the antivirus program will keep the security risk on your computer and will no longer detect it to remove from your computer.
    • Ignore or Skip: This option tells the scanner to ignore the threat for this scan only. It will be detected again the next time that you run a scan.
    • Cancel: This option is new to Norton Antivirus 2005. It is used when Norton Antivirus 2005 has determined that it cannot delete a security risk. This Cancel option tells the scanner to ignore the threat for this scan only, and thus, the threat will be detected again the next time that you run a scan.

      To actually delete the security risk:
      • Click its file name (under the Filename column).
      • In the Item Information box that displays, write down the full path and file name.
      • Then use Windows Explorer to locate and delete the file.

        If Windows reports that it cannot delete the file, this indicates that the file is in use. In this situation, complete the rest of the instructions on this page, restart the computer in Safe mode, and then delete the file using Windows Explorer.
    • Delete: This option will attempt to delete the detected files. In some cases, the scanner will not be able to do this.
      • If you see a message, "Delete Failed" (or similar message), manually delete the file.
      • Click the file name of the threat that is under the Filename column.
      • In the Item Information box that displays, write down the full path and file name.
      • Then use Windows Explorer to locate and delete the file.

        If Windows reports that it cannot delete the file, this indicates that the file is in use. In this situation, complete the rest of the instructions on this page, restart the computer in Safe mode, and then delete the file using Windows Explorer.

    3. To edit the hosts file
    Follow the instructions for your operating system:
    • Windows 95/98/Me/NT/2000
    • Click Start, point to Find or Search, and then click Files or Folders.
    • Make sure that "Look in" is set to (C:) and that "Include subfolders" is checked.
    • In the "Named" or "Search for..." box, type:

      hosts
    • Click Find Now or Search Now.
    • For each Hosts file that you find, right-click the file, and then click Open With.
    • Deselect the "Always use this program to open this program" check box.
    • Scroll through the list of programs and double-click Notepad.
    • When the file opens, delete the any lines that begin with "216.200.3.32".
    • Close Notepad and save your changes when prompted.
    • Windows XP
    • Click Start > Search.
    • Click All files and folders.
    • In the "All or part of the file name" box, type:

      hosts
    • Verify that "Look in" is set to "Local Hard Drives" or to (C:).
    • Click More advanced options.
    • Check Search system folders.
    • Check Search subfolders.
    • Click Search.
    • Click Find Now or Search Now.
    • For each Hosts file that you find, right-click the file, and then click Open With.
    • Deselect the Always use this program to open this program check box.
    • Scroll through the list of programs and double-click Notepad.
    • When the file opens, delete the any lines that begin with "216.200.3.32".
    • Close Notepad and save your changes when prompted

    4. To reset the Internet Explorer home page
  • Start Microsoft Internet Explorer.
  • Connect to the Internet, and then go to the page that you want to set as your home page.
  • Click Tools > Internet Options.
  • In the Home page section of the General tab, click Use Current > OK.
    For additional information, or if this procedure does not work, read the Microsoft® Knowledge Base article, "Home Page Setting Changes Unexpectedly, or You Cannot Change Your Home Page Setting, Article ID 320159."

      5. To reset the Internet Explorer Search page
      Follow the instructions for your version of Windows.

      Windows 98/Me/2000
    • Start Microsoft Internet Explorer.
    • Click the Search button on the toolbar.
    • In the Search pane, click Customize.
    • Click Reset.
    • Click Autosearch Settings.
    • Select a search site from the drop-down list, and then click OK.
    • Click OK.
      Windows XP
      Because Windows XP is set by default to use animated characters in the search, how you do this can vary. Read all the instructions before you start.
    • Start Microsoft Internet Explorer.
    • Click the Search button on the toolbar.
    • Do one of the following:
      • If the pane that opens looks similar to this picture:





        click the word Customize. Then skip to step h.
      • If the pane that opens has the words "Search Companion" at the top, and the center looks similar to this picture:





        click the Change preferences link as shown above. Proceed with step d.
    • Click the Change Internet search behavior link.
    • Under "Internet Search Behavior," click With Classic Internet Search.
    • Click OK. Then close Internet Explorer. (Close the program for the change to take effect.)
    • Start Internet Explorer. When the search pane opens, it should now look similar to this:





      Click the word Customize, and then proceed with the next step.
    • In the Search pane, click Customize.
    • Click Reset.
    • Click Autosearch Settings.
    • Select a search site from the drop-down list, and then click OK.
    • Click OK.
    • Do one of the following:
      • If you were using (or want to continue using) the "Classic Internet Search" panel, stop here (or proceed with the next section).
      • If you want to go back to the "Search Companion" search (it usually has an animated character at the button), proceed with step n.
    • Click the word Customize again.
    • In the "Customize Search Settings" window, click Use Search Companion > OK.
    • Close Internet Explorer. The next time you open it, it will again use the Search Companion

      6. To delete the Web sites added to the Internet Explorer Favorites menu
        • Start Microsoft Internet Explorer
        • Click Favorites > Organize Favorites
        • Delete the Favorites added by the threat



    • Security Advisories Database

      Remote Code Execution Vulnerability in Microsoft OpenType Font Driver

      A remote attacker can execute arbitrary code on the target system.

      07/21/2015

      SQL Injection Vulnerability in Piwigo

      SQL inection vulnerability has been discovered in Piwigo.

      02/05/2015

      Cross-site Scripting Vulnerability in DotNetNuke

      A cross-site scripting (XSS) vulnerability has been discovered in DotNetNuke.

      02/05/2015

      Cross-site Scripting Vulnerability in Hitachi Command Suite

      A cross-site scripting vulnerability was found in Hitachi Command Suite.

      02/02/2015

      Denial of service vulnerability in FreeBSD SCTP RE_CONFIG Chunk Handling

      An attacker can perform a denial of service attack.

      01/30/2015

      Denial of service vulnerability in Apache Traffic Server HTTP TRACE Max-Forwards

      An attacker can perform a denial of service attack.

      01/30/2015

      Denial of service vulnerability in MalwareBytes Anti-Exploit &quot;mbae.sys&quot;

      An attacker can perform a denial of service attack.

      01/30/2015

      Denial of service vulnerability in Linux Kernel splice

      An attacker can perform a denial of service attack.

      01/29/2015

      Denial of service vulnerability in Python Pillow Module PNG Text Chunks Decompression

      An attacker can perform a denial of service attack.

      01/20/2015