Dexter
Posted: December 11, 2012
Threat Metric
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
Threat Level: | 2/10 |
---|---|
Infected PCs: | 15 |
First Seen: | December 11, 2012 |
---|---|
OS(es) Affected: | Windows |
Dexter is a spyware Trojan that's built to compromise POS (point-of-sale) computers and steal credit card information. Instead of infecting personal computers, Dexter spreads (via currently unknown means) to infect the business computers of various restaurants, hotels and other businesses, including the machines of major brand-name companies. Since just using your credit card at a business's Dexter-infected PC can result in a criminal getting their hands on your card data, SpywareRemove.com malware experts recommend that you keep alert for any signs of credit card fraud connected with your credit card information and take steps to protect your credit card information whenever necessary. Businesses in the United States are especially at risk for Dexter attacks, but other countries also have confirmed Dexter infections, particularly Canada and other first-world nations.
Dexter – A Trojan that's Worse for Your Finances than the Slasher of Television Fame
Dexter is designed to attack Windows PCs for a variety of different versions of that OS, including Windows 7 all the way back to Windows XP. Unlike Trojans that are meant to compromise personal computers, Dexter doesn't appear to spread through malicious websites or spam links. Due to the high numbers of Windows server software on Dexter-infected computers, some PC security analysts have posited that Dexter is exploiting a Windows server vulnerability, although SpywareRemove.com malware experts also note that other means – particularly USB thumb drives – also may be used to install Dexter.
Dexter has been seen attacking POS computers throughout the United States, the United Kingdom, Canada and other countries in Europe, with roughly thirty percent of confirmed Dexter infections in the US alone. After Dexter is installed, Dexter uploads a memory dump to a remote server, which can then sort through the information for credit card details. SpywareRemove.com malware researchers emphasize that anyone who's had their credit card processed by a Dexter-infected PC may, therefore, have had their information stolen without any personal security compromises on their end.
Keeping Your Business from Giving Away the Credit Cards of Your Customers
Dexter's infection vectors may have yet to be firmly defined, but general PC security measures still should be effective at guarding your business against Dexter-related attacks. Monitoring usage of your work machines and preventing unauthorized uses of removable drive devices will reduce the chances of your business being the next unwitting accomplice to Dexter's credit card theft. Keeping your software updated also will reduce potential vulnerabilities that could be used to install Dexter. If possible, SpywareRemove.com malware researchers also recommend that you avoid using Windows Server software unless it's necessary for your business operations.
Since Dexter is a spyware program that doesn't display symptoms, having anti-malware products available even on your work PCs becomes an obvious necessity. Without appropriate anti-malware software to detect Dexter, you're unlikely to be alerted to Dexter's attacks – at least until the first complaints from your customers begin to make themselves heard.
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.