W32.Inteter.Trojan


Aliases: Trojan.Win32.Inteter.F, Troj/Inteter-F, Trojan.Win32.Inteter.F, TROJ_INTETER.F, W32/Inteter.F
Variants: Win32.Inteter.ac, Trojan.Win32.Inteter.a

Classification: Malware
Category: Trojan Horse

Status: Inactive
Spreading: Slow
Geographical info: N/A
Removal: Hard
Platform: W32
Discovered: 15 May 2003
Damage: Low

Characteristics: The malware W32.Inteter.Trojan is a Trojan Horse program under the Hijacker category. It is a program masked as a valid file to goad users into installing it. This malicious program is created to carry out a host of malicious operations on the compromised computer system. This Trojan does not replicate unlike worms and viruses but it may be as destructive or more destructive than other malware that can replicate.

More details about W32.Inteter.Trojan

The Trojan Horse W32.Inteter.Trojan is capable of configuring itself to start along with the Windows operating system. It does this by adding 2 values to specific registry keys. Once installed, this Trojan will copy itself as two files with the .exe file extension. It will then go on to modify the home page of Internet Explorer by changing and monitoring the value for the ‘Start Page’ under a particular registry key. This malware modifies the home page of the Internet Explorer to specific sites that are potentially malicious. These sites have infected links on them that when clicked may trigger the download of more security threats to the already compromised machine. Some remote hackers may also use this Trojan for creating fake web traffic to their website.

There are several reasons why a computer system can be infected with the W32.Inteter.Trojan. These reasons include lax Web browser and operating system security settings and not applying safe Internet and computer practices. This Trojan can also be acquired via downloading shareware or freeware, using P2P applications and visiting and clicking on links on unknown websites. When removing the infection of this security risk, it is necessary to turn off the System Restore feature on Windows XP or ME. This Trojan’s main executable also has to be detected and this can be done by viewing the list of processes on the Windows Task Manager. Once detected, end the process and then close the Task Manager. You can also search for the files that the Trojan has dropped via the Windows’ ‘Search’ function and then delete them. Next, go to the Registry editor and delete the values added by the W32.Inteter.Trojan.