Nuker.Click.22 (AVP), Click Trojan (McAfee) / Flooder.Win32.Click.12 (Kaspersky Lab) is also known as: Flooder.ICMP.Click.12 (Kaspersky Lab), Nuke-Click (McAfee), Hacktool.Nuker (Symantec), Nuke.Click.21508 (Doctor Web), Troj/Nuke-Anark (Sophos), Nuker:Win32/Aclick (RAV), DDOS_CLICK.12 (Trend Micro), TR/Nuker.Click (H+BEDV), Win32:Trojan-gen. (ALWIL), Trojan.Nuker.Aclick (SOFTWIN), Trojan.Nuker.Click (ClamAV), Flooder Program (Panda), Win32/Flooder.ICMP.Click.12 (Eset)
Category: Trojan Horse
11 Jul 2002
The W32.Click.DoS program is known as a fully customizable Denial of Service attack tool which affects a lot of computer based Operating Systems such as Windows 3.x, 95, 98, Me, NT, XP, 2000, Macintosh, Microsoft IIS, Linux and UNIX.
W32.Click Removal Tool
If you have Malware on your computer it will cause annoyances and will damage your system. You should either:
A. Manually remove the infected files from your computer, or
B. Automatically scan your system using trusted software
We recommend that you scan your system for malware. Our partner has a trojan horse removal tool to automatically clean W32.Click from your computer.
More details about W32.Click
The W32.Click.DoS program enters a computer through websites that are not secure. This program may also be unknowingly downloaded by the user from P2P (peer-to-peer) file sharing programs. The Trojan software does not go through the usual installation procedure. It launches on the computer without the user’s knowledge. The files added by the Trojan application may appear as legitimate processes. This is because the files added by the Trojan program take legitimate Windows process filenames, such as mmc.exe, notepad.exe, svchost.exe and mstsc.exe. The Trojan program auto-starts each time the system is opened. The files added by the application are not visible on the computer. This is because the Trojan application has rootkit functions that enable it to hide its files.
The W32.Click.DoS program creates a backdoor on the affected computer. This backdoor serves as a means for the remote user to communicate with the Trojan software. The backdoor is used to send some commands for the Trojan application to perform. These tasks may include deleting of files from the affected computer, uploading and downloading of data and removal of files from the user’s computer. The Trojan software can also be used to carry out DoS (Denial of Service) attacks against other systems. The kit used to create that Trojan program allows the remote user to set the parameters of the infection. It uses an advanced UI (User Interface). This includes the filenames for the executable files, the installation path and the mutex (mutual exclusion) name.