Already on ArticleSlash?

Forgot your password? Sign Up

The Rise of Vundo Trojan

Alberta Glamerheim

Visitors: 719

If there's a virus out there that deserves the right to be called a Disaster of 2008, then Vundo Trojan is definitely a candidate for the nomination. Its impact on the Web has yet to be analyzed, but it certainly is huge. The number of infected computers quickly went over a million of PC's.

Partially the spread like that of a forest fire can be accounted for different paths how Vundo sneaks into systems. That's why common antivirus protection often fails to spot the threat. Among popular Windows-based PC vulnerabilities, the following are most widely exploited by Trojan Vundo and its clones:

  • Downloads of shareware programs from unsafe websites (like P2P networks - torrent, limewire, emule, etc). Malicious code is added to executable installation files of popular products - i. e. antivirus software, parental controls, etc. - and distributed via websites visited by millions of people daily. It is important to know that a contaminated executable of a legit program is unlikely to be spotted as dangerous. Whenever you start executing the file, that is, double-click it, infection takes place immediately. Parts of the Vundo parasite are places in different folders and related to the Windows registry with autorun keys;
  • There's a documented vulnerability in Java installation. Though the problem has been fixed by an update released by Java developers, there are many computers with outdated Java;
  • Windows Operating System itself is vulnerable to Vundo which is able to exploit security breeches. Although Microsoft released patches, due to different reasons a lot of PC users haven't applied them yet, leaving their computers at risk of infestation;
  • The use of all kinds of illegal software patches poses a great risk; code of Vundo Trojan is often embedded into cracking programs.

The conclusion here is simple; to minimize the chances of getting infected with Vundo virus, it is crucial to have all software programs updated; same applies to Windows. Automatic Updates, implemented since Windows 2000, offer an easy way to stay protected. Also, download any programs from manufacturer websites only, or use trusted, reputable resources. If possible, switch from Internet Explorer to a browser with better safety degree. These are all simple steps, yet they significantly decrease the risk of devastating a computer with a vundo Trojan.

Follow easy steps for a complete Trojan Vundo Removal process. Learn about the consequences of infection, and what software can prevent the Vundo disaster from ever happening.
Alberta Glamerheim is a PC management and data protection consultant who publishes articles about Internet security and Windows-based computers’ maintenance.


Article Source:

Rate this Article: 
Your 'No' Could Mean 'Yes' To A Trojan
Rated 4 / 5
based on 5 votes

Related Articles:

Trojan Removal & the Importance of a Large Trojan Virus List

by: Jeff Farley (August 12, 2008) 
(Computers and Technology/Personal Tech)

How to Remove Trojan Horse Or the Top 3 Ways to Get Rid of Trojan Virus

by: Steve Wells (July 13, 2008) 
(Computers and Technology/Software)

Removal Of Spyware Trojan With Trojan Remover

by: Arvind Singh (March 26, 2008) 
(Computers and Technology/Software)

Trojan Horse Removal - What to Look For in Trojan Horse Remover Software

by: Victor Emmanuel (September 13, 2008) 
(Computers and Technology/Software)

Remove Vundo and Virtumonde Using Free Software

by: Matthew Rizos (June 17, 2008) 
(Computers and Technology/Software)

Remove Trojan Virus - a Simple Guide to Remove a Trojan Virus in Minutes!

by: Jim Marshall (September 17, 2008) 
(Computers and Technology/Software)

The Rise And Rise Of Metal Theft - And How To Stop It

by: Dave Tyrell (February 08, 2008) 

The Rise and Fall and Rise of Venetian Glassmaking

by: Ronald Peterson (April 11, 2008) 
(Shopping and Product Reviews/Jewelry Diamonds)

Trojan Virus Remover - Does My Computer Need a Trojan Virus Remover?

by: Jim Marshall (September 10, 2008) 
(Computers and Technology/Software)

Your 'No' Could Mean 'Yes' To A Trojan

by: A Singh (March 17, 2007) 
(Internet and Businesses Online)