Home Malware Programs Trojans AMG Trojan

AMG Trojan

Posted: March 28, 2006

AMG Trojan is a macro-based Trojan that attacks new computers via MS Access files. Trojan infections like AMG Trojan are highly likely to disable the PC security, download and install malicious programs without the user's permission and perform other invasive functions like stealing account passwords. Software-based protection against AMG Trojan exists is a recent development, and you may need to update your anti-malware scanners to detect and remove AMG Trojan.

AMG Trojan is a Unique Snowflake of a Trojan

AMG Trojan's most distinguishing characteristic is AMG Trojan's macro-based functions. 'Macro' infections are written in a script specific to a particular program and can only attack computers that use that program. The program of choice for AMG Trojan is MS Access, so if you're not using Microsoft Access, you have a lot less to worry over with regards to computer safety.

Microsoft Access is an older version of what is currently Microsoft Office Access, part of the Microsoft Suite – this program is included by default in purchases of Windows that are Professional-level or higher, but not in lesser editions. It's currently unknown if AMG Trojan is compatible with Microsoft Office Access or if AMG Trojan is only compatible with the older program.

As a macro Trojan, AMG Trojan will run when AMG Trojan's file is opened by MS Access, executing any number of malicious commands. Avoid untrustworthy file sources or downloads that you haven't verified as safe, and exposure to AMG Trojan will be unlikely. Remember that a file may be misnamed so that its actual file type doesn't match the visible label – if a file in an unrelated format launches MS Access, you should be suspicious!

Potential Dangers in the MS Access Piggyback-Rider

Threats by AMG Trojan and similar Trojans may take the following forms:

  • Your firewall and other security measures may be disabled or have exceptions created to let AMG Trojan bypass them. This can allow remote attackers to control your PC as well as enabling other standard Trojan attacks.
  • AMG Trojan may download and install malicious programs without your consent. These can take the form of rogue security programs and other infections that show fake system alerts, or keyloggers and similar spyware that specialize in stealing personal information.
  • AMG Trojan may continue to run in the background by corrupting your Windows Registry and making other unauthorized system changes.

The sum of AMG Trojan's malicious behavior can result in serious and escalating damage to your computer, and so removing AMG Trojan is best done quickly. Although manually removing AMG Trojan files may be a viable solution, utilizing an anti-malware scanner with recent updates is more likely to result in the desired full-deletion.

Since most Trojans like AMG Trojan will make a habit of downloading other malware, you should perform a full system scan to check for other infections. Rebooting into Safe Mode will give you the best environment for detecting AMG Trojan and any other malware threats to make deleting them a cinch.

Related Posts

Loading...