Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

4/4/2012
07:16 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Panda Security Releases Panda ActiveScan Cleaner

Tool capable of detecting and removing all variants of the Sirefef Trojan

Bracknell, April 3rd, 2012

Panda Security – The Cloud Security Company – has released Panda ActiveScan Cleaner, the only tool capable of detecting and removing all variants of the Sirefef Trojan. The Trojan, whose first variant was identified at the beginning of the year, has infected thousands of computers so far. Most infections have taken place in Spain, although there have been cases reported in other countries, including the United States, the United Kingdom and Germany, reaching epidemic proportions. Panda Security offers users Panda ActiveScan Cleaner, a new and powerful free application to detect and remove this malicious program, at: http://activescancleaner.pandasecurity.com

Sirefef, also known as Abnow or Zero Access, reaches the victim’s computer in different ways, including as a fake QuickTime update. It then modifies several system files, redirecting results of online search engines to two malicious websites: abnow.com and mediashifting. Additionally, it downloads more malware onto the computer, including fake antivirus programs. Sirefef is a polymorphic Trojan with rootkit characteristics to remain hidden from antivirus engines. If the Trojan is not completely removed it has potential to re-infect the system. It is therefore advisable to use a tool like Panda ActiveScan Cleaner, which can eliminate the Trojan completely.

“We have detected thousands of Sirefef infections over the last two months”, explained Luis Corrons, Technical Director of PandaLabs. “The Trojan uses advanced infection techniques and stealth capabilities, and it is particularly difficult to completely disinfect the computer unless you remove all of its components. That’s why we offer Panda Activescan Cleaner, a free tool that harnesses the power of Collective Intelligence to identify all of Sirefef’s components and ensure complete disinfection.”

Panda ActiveScan Cleaner is Panda Security’s new on-demand malware detection and removal tool, capable of disinfecting thousands of malware strains like Sirefef. It leverages the power of Panda Security’s Collective Intelligence, a system that automatically analyzes, classifies and remedies the more than 73,000 new malware specimens received at PandaLabs every day.

“Even though you might not be experiencing the symptoms of a Sirefef infection, it is advisable to scan your computer with Panda ActiveScan Cleaner to make sure there is no malware installed. Prevention is better than cure,” added Corrons.

All users, regardless of their antivirus solution, can download and use Panda ActiveScan Cleaner completely free at: http://activescancleaner.pandasecurity.com

About PandaLabs

Since 1990, PandaLabs, Panda Security’s malware research laboratory, has been working to detect and classify malware in order to protect consumers and companies against new Internet threats. To do so, PandaLabs uses Collective Intelligence, a cloud-based proprietary system that leverages the knowledge gathered from Panda’s user community to automatically detect, analyse and classify the more than 73,000 new malware strains that appear every day. This automated malware classification is complemented through the work of an international team with researchers specialized each in a specific type of malware (viruses, worms, Trojans, spyware and other attacks) to provide global coverage. Get more information about PandaLabs and subscribe to its blog news feed at http://www.pandalabs.com.

For more information:

Visit our main website http://www.pandasecurity.com/ or our dedicated press site http://press.pandasecurity.com/.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
FluBot Malware's Rapid Spread May Soon Hit US Phones
Kelly Sheridan, Staff Editor, Dark Reading,  4/28/2021
Slideshows
7 Modern-Day Cybersecurity Realities
Steve Zurier, Contributing Writer,  4/30/2021
Commentary
How to Secure Employees' Home Wi-Fi Networks
Bert Kashyap, CEO and Co-Founder at SecureW2,  4/28/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-26077
PUBLISHED: 2021-05-10
Broken Authentication in Atlassian Connect Spring Boot (ACSB) in version 1.1.0 before 2.1.3 and from version 2.1.4 before 2.1.5: Atlassian Connect Spring Boot is a Java Spring Boot package for building Atlassian Connect apps. Authentication between Atlassian products and the Atlassian Connect Spring...
CVE-2021-31755
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /goform/setmac allows attackers to execute arbitrary code on the system via a crafted post request.
CVE-2021-31756
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /gofrom/setwanType allows attackers to execute arbitrary code on the system via a crafted post request. This occurs when input vector controlled by malicious attack get copie...
CVE-2021-31757
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /goform/setVLAN allows attackers to execute arbitrary code on the system via a crafted post request.
CVE-2021-31758
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /goform/setportList allows attackers to execute arbitrary code on the system via a crafted post request.