Grobios Trojan — How to Remove Active Infections from Your PC

This article has been created in order to explain what is the Grobios Trojan and how to remove this malware completely from your computer.

The Grobios Trojan is a dangerous virus threat that has recently been identified in a hacker campaign. It contains advanced code that can cause a lot of damage to the infected hosts, including remote surveillance of the users in real-time. Read more about recovering infected hosts in our complete Grobios Trojan removal guide.

Threat Summary

TypeTrojan Horse Virus
Short DescriptionSilently infects the target machines and modifies key applications and system services.
SymptomsThe user may not experience any signs of infiltration.
Distribution MethodMalicious web links, Malicious Files, Malicious E-Mails
Detection Tool See If Your System Has Been Affected by Grobios

Malware Removal Tool

User ExperienceJoin Our Forum to Discuss Grobios.

Grobios – How Does It Infect

The Grobios Trojan is a potent weapon that can be delivered using various methods. Depending on the target users the operators can choose the most adequate tool. A preferred method may be the use of email SPAM messages that utilize social engineering techniques. Usually they contain hijacked content from legitimate sites and services in the form of text and graphics. Counterfeit notification messages can be crafted that can include the Trojan instances. In addition the emails can also be used to spread infected payload carriers, two popular types are the following:

  • Software Installers — The hackers can embed the Grobios Trojan code in application installers of various types: system utilities, creativity suites, productivity programs and even computer games.
  • Infected Documents — The hackers behind the Grobios Trojan can infect documents using the same mechanism. Targets can be presentations, text documents or spreadsheets. The typical behavior is to integrate dangerous scripts in them, (Read more...)

*** This is a Security Bloggers Network syndicated blog from How to, Technology and PC Security Forum authored by Martin Beltov. Read the original post at: