Threat Description

Trojan-Proxy

Details

Aliases:Trojan-Proxy, Trojan.proxy
Category:Malware
Type:Trojan-Proxy
Platform:W32

Summary



This type of trojan allows unauthorized parties to use the infected computer as a proxy server to access the Internet anonymously.



Removal


Automatic action

Once detected, the F-Secure security product will automatically disinfect the suspect file by either deleting it or renaming it.

More

You may wish to refer to the Support Community for further assistance. You also may also refer to General Removal Instructions for a general guide on alternative disinfection actions.



Technical Details



When searching our Virus Descriptions database for a specific program (e.g., Trojan-Proxy:W32/Example.A), you may be directed to this page if the overview below sufficiently describes the program.

Alternatively, you may be directed to this page if no description matching that specific query is currently available. You can submit a sample of the suspect file to our Response Lab for further analysis via:

About Trojan-Proxies

A Trojan-Proxy is a type of trojan that, once installed, allows an attacker to use the infected computer as a proxy to connect to the Internet.

Trojan-Proxies are often used by hackers to hide the location of the original host from any investigating authorities, as the connection can only be traced back to the computer where the trojan is installed.

More

For more information, see Terminology: Trojan.






SUBMIT A SAMPLE

Suspect a file or URL was wrongly detected? Submit a sample to our Labs for analysis

Submit Now

Scan & clean your PC

F-Secure Online Scanner will scan and clean your PC in just a few minutes for free

Learn More