Post by yummy on Jul 22, 2004 10:42:40 GMT -5
Microsoft teams have confirmed a report of a security issue known as Download.Ject that affects customers using Microsoft Internet Explorer, a component of Microsoft Windows.
Important Users of Windows XP Service Pack 2 Release Candidate 2 (Windows XP SP2 RC2) are not at risk.
When a user visits a Web site hosted on a server that is infected with Download.Ject, the Web pages download a Trojan horse to the user's computer. This Trojan horse is named Backdoor:W32/Berbew, also known as Backdoor-AXJ, Webber, or Padodor. When this Trojan horse runs on the user's computer, it may perform several actions, including monitoring Internet access to capture sensitive information such as logon names and passwords, or opening fake dialog boxes that prompt the user to enter confidential information such as ATM card codes, credit card numbers, or other confidential information. Microsoft has released a tool to help you remove Backdoor:W32/Berbew Trojan horse variants from your computer.
1.
Automatically Detect and Attempt to Remove Malicious Software Delivered by Download.Ject
You can use the Download.Ject removal tool to detect and attempt to remove certain variants of malicious software delivered by the Download.Ject Trojan horse. To use this tool, click the Check My PC for Infection button.
Important This tool requires you to restart your computer to finish the detection and removal process. To use this tool, you must be running Windows XP or Windows 2000.
This tool scans your hard disk for malicious software delivered by the Download.Ject Trojan horse and attempts to remove it. To proceed, click the Check My PC for Infection button.
Note If you have difficulty running the Download.Ject removal tool from this page, it may be due to your browser's security settings. You can also try downloading the removal tool from the Microsoft.com Download Center and running it manually.
2.
Install Critical Updates
Go to the Windows Update Web site to install any critical updates that are available.
Windows Update iconGet updates from Windows Update now
3.
Increase Your Browsing and E-Mail Safety
Follow the steps to Increase Your Browsing and E-Mail Safety.
Important Users of Windows XP Service Pack 2 Release Candidate 2 (Windows XP SP2 RC2) are not at risk.
When a user visits a Web site hosted on a server that is infected with Download.Ject, the Web pages download a Trojan horse to the user's computer. This Trojan horse is named Backdoor:W32/Berbew, also known as Backdoor-AXJ, Webber, or Padodor. When this Trojan horse runs on the user's computer, it may perform several actions, including monitoring Internet access to capture sensitive information such as logon names and passwords, or opening fake dialog boxes that prompt the user to enter confidential information such as ATM card codes, credit card numbers, or other confidential information. Microsoft has released a tool to help you remove Backdoor:W32/Berbew Trojan horse variants from your computer.
1.
Automatically Detect and Attempt to Remove Malicious Software Delivered by Download.Ject
You can use the Download.Ject removal tool to detect and attempt to remove certain variants of malicious software delivered by the Download.Ject Trojan horse. To use this tool, click the Check My PC for Infection button.
Important This tool requires you to restart your computer to finish the detection and removal process. To use this tool, you must be running Windows XP or Windows 2000.
This tool scans your hard disk for malicious software delivered by the Download.Ject Trojan horse and attempts to remove it. To proceed, click the Check My PC for Infection button.
Note If you have difficulty running the Download.Ject removal tool from this page, it may be due to your browser's security settings. You can also try downloading the removal tool from the Microsoft.com Download Center and running it manually.
2.
Install Critical Updates
Go to the Windows Update Web site to install any critical updates that are available.
Windows Update iconGet updates from Windows Update now
3.
Increase Your Browsing and E-Mail Safety
Follow the steps to Increase Your Browsing and E-Mail Safety.