Security Bulletins
Latest Malware Updates
Downloader.Busadom!g102/27/2015Infostealer.Posteal02/26/2015Downloader.Busadom02/26/2015Trojan.Ladocosm02/26/2015SONAR.SuspDocRun02/25/2015SONAR.SuspHelpRun02/25/2015W32.Tempedreve.D!inf02/25/2015SONAR.PUA!AlnadInsta02/25/2015SONAR.Infostealer!g502/25/2015SONAR.Infostealer!g402/25/2015 |
01/01/1970
Adware.CydoorType: AdwareDiscovered: 01.01.1970 Updated: 13.02.2007 Affected systems: Windows 2000, Windows 95, Windows 98, Windows Me, Windows NT, Windows XP AV Vendor: Symantec Description: Adware.Cydoor is an adware program that displays advertisements. When Adware.Cydoor is executed, it performs the following actions:
HKEY_USERS\.DEFAULT\Software\Cydoor Services HKEY_CURRENT_USER\Software\Cydoor HKEY_CURRENT_USER\Software\Cydoor Services HKEY_LOCAL_MACHINE\Software\Cydoor HKEY_LOCAL_MACHINE\Software\Cydoor Services HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\AdSupport_291 HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\AdSupport_202 HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\AdSupport_336 Other programs usually install Adware.Cydoor. It does not add a registry value to launch itself at startup. Instead, it allows the program that installed it to launch it as the program itself is started. Then, the program uses Adware.Cydoor to download and display advertisements. The Cd_load.exe file is only installed when the program that installed Adware.Cydoor does not require an Internet connection to function. This file is only used to check for the active Internet connections. The file, Cd_clint.dll, contains all the functionality. When Adware.Cydoor is launched after installation, it will contact the server www.rgs[?].net (in which [?] is a number between 1 – 4) on port 80. However, it is not limited to this server. This adware can receive a list of other servers from this initial server and connect to them instead. These servers are advertisement servers, and it is from these servers that cydoor retrieves the advertisements. Removal instructions from Symantec Security Response Team
For specific details on each of these steps, read the following instructions. To obtain the most recent definitions, start your Symantec program and run LiveUpdate. 2. Restarting the computer in Safe mode Shut down the computer and turn off the power. Wait for at least 30 seconds, and then restart the computer in Safe mode or VGA mode. For instructions, read the document, "How to start the computer in Safe Mode." Note: If your Symantec antivirus product reports that it cannot delete a detected file, note the path and file name. Then use Windows Explorer to locate and delete the file. 4. Deleting the keys from the registry WARNING: Symantec strongly recommends that you back up the registry before making any changes to it. Incorrect changes to the registry can result in permanent data loss or corrupted files. Modify the specified keys only. Read the document, "How to make a backup of the Windows registry," for instructions. Then click OK. (The Registry Editor opens.) HKEY_USERS\.DEFAULT\Software\Cydoor Services HKEY_USERS\.DEFAULT\Software\Cydoor HKEY_CURRENT_USER\Software\Cydoor HKEY_CURRENT_USER\Software\Cydoor Services HKEY_LOCAL_MACHINE\Software\Cydoor HKEY_LOCAL_MACHINE\Software\Cydoor Services HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\AdSupport_291 HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\AdSupport_202 HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\AdSupport_336 |
Security Advisories Database
Remote Code Execution Vulnerability in Microsoft OpenType Font DriverA remote attacker can execute arbitrary code on the target system. 07/21/2015Multiple Vulnerabilities in Linux kernel03/04/2015SQL Injection Vulnerability in PiwigoSQL inection vulnerability has been discovered in Piwigo. 02/05/2015Cross-site Scripting Vulnerability in DotNetNukeA cross-site scripting (XSS) vulnerability has been discovered in DotNetNuke. 02/05/2015Cross-site Scripting Vulnerability in Hitachi Command SuiteA cross-site scripting vulnerability was found in Hitachi Command Suite. 02/02/2015Denial of service vulnerability in FreeBSD SCTP RE_CONFIG Chunk HandlingAn attacker can perform a denial of service attack. 01/30/2015Denial of service vulnerability in Apache Traffic Server HTTP TRACE Max-ForwardsAn attacker can perform a denial of service attack. 01/30/2015Denial of service vulnerability in MalwareBytes Anti-Exploit "mbae.sys"An attacker can perform a denial of service attack. 01/30/2015Denial of service vulnerability in Linux Kernel spliceAn attacker can perform a denial of service attack. 01/29/2015Denial of service vulnerability in Python Pillow Module PNG Text Chunks DecompressionAn attacker can perform a denial of service attack. 01/20/2015 |