This JavaScript (JS) malware may be hosted on a Web site and run when a user accesses the said Web site. Ones a user accesses the website where this malware is hosted, they will be automatically be redirected to certain malicous Web sites to download file. Trend Micro detects the downloaded files the following: * err.www404.cn/614.gif[/img] - detected by Trend Micro as VBS_PSYME.CIL * err.www404.cn/real10.gif[/img] - detected by Trend Micro as JS_REAPLAY.B * err.www404.cn/bf.gif[/img] - detected by Trend Micro as JS_EXPLOIT.GQ * err.www404.cn/lz.gif[/img] - detected by Trend Micro as JS_EXPLOIT.GR * err.www404.cn/real11.gif[/img] - detected by Trend Micro as JS_REALPLAY.AI * js.tongji.cn.yahoo.com/621252/ystat.js[/url] - unavailable It then executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the affected system. It runs on Windows 98, ME, NT, 2000, XP, and Server 2003.
AVG has recently (in the last 24-48 hours) sent out an update to their Web Shield software. It now appears that this update is causing the software to incorrectly identify a perfectly safe page counting process as some kind of threat. As a result some users are receiving a threat alert when visiting forums at Aimoo as well as other websites. If you are among those affected you will receive a message saying this; Threat Detected! File name - js.tongji.cn.yahoo.com/611067/ystat.js Threat name - Exploit Javascript Obfuscation (type 624) Please note, this is a incorrect report, known as a false positive, and there is NO THREAT. If you are affected please report this to AVG to ensure they are aware of the extent of the problem. The more complaints they receive the quicker they will send out an update to correct the issue. Just send an email to virus@avg.com and include a link to the website in question along with the information of what was being detected, i.e. the info listed in the error message. You do not need to include a screen shot, simply quoting the above information will be adequate.
Welcome to FriendVista.com (http://friendvista.com/forum/) | Powered by Discuz! 6.0.0 |