Search the Community
Showing results for tags 'trojan.kotver'.
Salutations, I recently discovered of an attempted intrusion by a variant of the Kotver Trojan. You can find all of the relevant details here (this includes logs from MBAM, HitmanPRO, FSS, FRST, and Kotver itself). According to the technician assisting me, he believes it originated from an exploit ad on a web page or something similar. This reinforces my initial suspicions that WinRAR is the culprit. For some time now, the application has been generating advertisements to convince you to buy a license of their product once the evaluation period has ended (AKA nagware). Malwarebytes' has warned me of this in the past, but the utility of the application outweighed the risks of this so-far benign problem. What further steps should be taken to ensure that there are no remaining remnants or accomplices remaining? Current security arsenal: I operate strictly on a whitelist-as-needed basis both at the system and browser-level. All files expressly downloaded by me are subject to testing in a secure virtual machine prior to execution in a production environment. Apologies for the long rambling, but I want to be as thorough as possible. Any suggestions to further enhance security in a Windows environment would be greatly appreciated.
Hello, Apologies if this is the incorrect place to post this, but it is more of a hypothetical question regarding MBAE's abilities rather than a support inquiry. I recently discovered an intrusion attempt by Kotver-variant trojan. I believe I have tracked down the source, but I intend to do a follow-up on the Removal forums. Can the free version of MBAE theoretically stop an exploit from a webpage generated by an application or would that require premium?