If there's a virus out there that deserves the right to be called a Disaster of 2008, then Vundo Trojan is definitely a candidate for the nomination. Its impact on the Web has yet to be analyzed, but it certainly is huge. The number of infected computers quickly went over a million of PC's.
Partially the spread like that of a forest fire can be accounted for different paths how Vundo sneaks into systems. That's why common antivirus protection often fails to spot the threat. Among popular Windows-based PC vulnerabilities, the following are most widely exploited by Trojan Vundo and its clones:
- Downloads of shareware programs from unsafe websites (like P2P networks - torrent, limewire, emule, etc). Malicious code is added to executable installation files of popular products - i. e. antivirus software, parental controls, etc. - and distributed via websites visited by millions of people daily. It is important to know that a contaminated executable of a legit program is unlikely to be spotted as dangerous. Whenever you start executing the file, that is, double-click it, infection takes place immediately. Parts of the Vundo parasite are places in different folders and related to the Windows registry with autorun keys;
- There's a documented vulnerability in Java installation. Though the problem has been fixed by an update released by Java developers, there are many computers with outdated Java;
- Windows Operating System itself is vulnerable to Vundo which is able to exploit security breeches. Although Microsoft released patches, due to different reasons a lot of PC users haven't applied them yet, leaving their computers at risk of infestation;
- The use of all kinds of illegal software patches poses a great risk; code of Vundo Trojan is often embedded into cracking programs.
The conclusion here is simple; to minimize the chances of getting infected with Vundo virus, it is crucial to have all software programs updated; same applies to Windows. Automatic Updates, implemented since Windows 2000, offer an easy way to stay protected. Also, download any programs from manufacturer websites only, or use trusted, reputable resources. If possible, switch from Internet Explorer to a browser with better safety degree. These are all simple steps, yet they significantly decrease the risk of devastating a computer with a vundo Trojan.
Follow easy steps for a complete Trojan Vundo Removal process. Learn about the consequences of infection, and what software can prevent the Vundo disaster from ever happening.
Alberta Glamerheim is a PC management and data protection consultant who publishes articles about Internet security and Windows-based computers’ maintenance.