Comfoo
Posted: August 8, 2013
Threat Metric
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
Threat Level: | 2/10 |
---|---|
Infected PCs: | 7 |
First Seen: | August 8, 2013 |
---|---|
OS(es) Affected: | Windows |
Comfoo is a spyware Trojan that is specialized for stealing confidential information. Although Comfoo is not distributed in the wild and usually only is related to specifically targeted attacks against individual organizations based in Asia, its capabilities are sufficiently sophisticated as to allow virtually all information to be stolen – without showing any symptoms during the course of the thefts. Comfoo also usually consists of multiple components and even can be related to separate PC threats, such as Poison Ivy, which are just as dangerous to your PC's security as Comfoo, itself. With all of this in mind, it shouldn't be surprising that SpywareRemove.com malware experts recommend using strong anti-malware software to remove Comfoo or block the original infections, which have an average lifetime of over half a year before they're caught and deleted.
Comfoo: the Chinese Spy that's Coming for You
Comfoo is a spyware program that's used in attacks against various government and business institutions in southeastern Asia, and its history is one of understated but effective that has tended to minimize its complicity in news headlines. Although one of the most noteworthy attacks involving Comfoo took place in 2010 (an attack against the RSA branch of Australia's EMC Corporation that also used the Poison Ivy backdoor Trojan), Comfoo has been in development from at least 2006. SpywareRemove.com malware researchers and others in the industry have noted numerous variants of Comfoo indicative of its ongoing development, with the count currently at over two hundred.
Comfoo's payload primary is designed to allow the theft of personal information through keylogging, 'man-in-the-middle' browser attacks and similar techniques that record and transfer your information without showing any symptoms. However, SpywareRemove.com malware researchers warn that Comfoo also is a fully-functional RAT or Remote Administration Tool. Malicious RATs like Comfoo are essentially backdoor Trojans, able to allow criminals to control your computer through remote Command & Control servers. This level of control can allow Comfoo to install other malware, delete files or modify your system settings without your permission (as just a few examples of its capabilities).
Don't Be the Fool that Comfoo Uses for Profit
Targeted attacks distributing Comfoo Trojans usually are initiated through spam e-mail. Business and government employees in Asia should be cautious about opening file attachments from unusual e-mail messages – since such attachments often are Trojan droppers that can install Comfoo and similar PC threats automatically. Updating your software can help to minimize the amount of vulnerabilities that could be used to install Comfoo, but this never should be treated as a substitute for having good anti-malware security.
Deleting Comfoo always should use anti-malware tools that can remove all of Comfoo's components and also catch any other malware related to a Comfoo infection. After removing Comfoo, you also may wish to consider re-securing any potentially leaked information. By default, SpywareRemove.com malware experts warn that Comfoo often will steal information such as account names, passwords and various basic OS details that could be used against your PC in future attacks.
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.