Home Malware Programs Trojans TROJ_ARTIEF.AEB

TROJ_ARTIEF.AEB

Posted: December 21, 2011

Threat Metric

Threat Level: 9/10
Infected PCs: 141
First Seen: December 21, 2011
Last Seen: October 30, 2023
OS(es) Affected: Windows

TROJ_ARTIEF.AEB is closely-associated with BKDR_PCCLIEN.BQD, since TROJ_ARTIEF.AEB serves as the installation method or Trojan dropper for BKDR_PCCLIEN.BQD. TROJ_ARTIEF.AEB's partner will, after its own installation, open a backdoor on your PC via port 8000 so that it can receive files and instructions from a remote server. This remote access should be considered a high-level threat to your computer's security, since it can allow hackers to steal private information, install other PC threats or even control the behavior of other programs. TROJ_ARTIEF.AEB spreads itself to new computers by disguising itself as a file attachment that offers news about the death of North Korea's ruler, Kim Jong II. If you've opened similar types of file attachments, your PC may be in danger of infection by TROJ_ARTIEF.AEB even if you don't see any symptoms. In such cases, you should verify or debunk the possible presence of TROJ_ARTIEF.AEB and remove TROJ_ARTIEF.AEB by using trustworthy anti-malware products.

TROJ_ARTIEF.AEB: Exploiting National News to Infect Your PC

TROJ_ARTIEF.AEB is just one of multiple types of Trojans (such as TROJ_PIDIEF.EGQ) that are spread by mass e-mail messages that claim to contain information about the death of Kim Jong II. As a file attachment that appears to be in the popular .doc format, TROJ_ARTIEF.AEB doesn't, on first inspection, look very dangerous, and even uses a tantalizing file name: 'Kim_Jong_il___s_death_affects_N._Korea___s_nuclear_programs.doc.' However, these e-mail messages are mere spam and should be deleted as soon as they fall into your virtual mailbox.

If you open TROJ_ARTIEF.AEB's file attachment, your PC will be infected, not just by TROJ_ARTIEF.AEB, but also by BKDR_PCCLIEN.BQD, which TROJ_ARTIEF.AEB installs without your permission. These attacks are likely to show few symptoms, and thus, SpywareRemove.com malware experts note that preventing a TROJ_ARTIEF.AEB attack is easier than noticing one underway, although you can still detect and remove TROJ_ARTIEF.AEB with modern anti-malware software.

A Defense That Will Tend to All of TROJ_ARTIEF.AEB's Criminal Partners

Also, known by the aliases of Exploit-CVE2010-3333, Exploit:Win32/CVE-2010-3333 and Trojan.Mdropper.C, TROJ_ARTIEF.AEB should be detected and removed during a full system scan. Anything less than this may allow TROJ_ARTIEF.AEB or a related PC threat, such as BKDR_PCCLIEN.BQD, to duck under deletion. You may also need to disable System Restore or boot Windows into Safe Mode to completely-delete TROJ_ARTIEF.AEB. SpywareRemove.com malware researchers have found that, as of the time of this writing, non-Windows computers are safe from TROJ_ARTIEF.AEB attacks.

You may also wish to monitor your firewall and network ports for unusual activity. Backdoor Trojans that are installed by TROJ_ARTIEF.AEB are especially-known for using port 8000 but may also be configured to use different ports. Under normal circumstances, to insure the security and privacy of your PC, you should close ports that aren't in use by reputable programs. Failing to do this can allow criminal access to your computer even if TROJ_ARTIEF.AEB and its payload are uninstalled.

Use SpyHunter to Detect and Remove PC Threats

If you are concerned that malware or PC threats similar to TROJ_ARTIEF.AEB may have infected your computer, we recommend you start an in-depth system scan with SpyHunter. SpyHunter is an advanced malware protection and remediation application that offers subscribers a comprehensive method for protecting PCs from malware, in addition to providing one-on-one technical support service.

* See Free Trial offer below. EULA and Privacy/Cookie Policy.

Why can't I open any program including SpyHunter? You may have a malware file running in memory that kills any programs that you try to launch on your PC. Tip: Download SpyHunter from a clean computer, copy it to a USB thumb drive, DVD or CD, then install it on the infected PC and run SpyHunter's malware scanner.

Loading...
Spywareremove.com uses cookies to provide you with a better browsing experience and analyze how users navigate and utilize the Site. By using this Site or clicking on "OK", you consent to the use of cookies. Learn more.