Metamorfo Trojan Removal Guide — Restore Your PC From Infections

This article has been created in order to explain what is the Metamorfo Trojan and how to remove this malware completely from your computer.

The Metamorfo Trojan is a newly discovered banking virus that can hijack account credentials and directly manipulate the browsers. Our removal guide features a detailed explanation of the banking Trojan’s mechanisms of operation, as well as instructions on restoring the infected computers from the infections.

Threat Summary

TypeTrojan Horse Virus
Short DescriptionSilently infects the target machines and modifies key applications and system services.
SymptomsThe user may not experience any signs of infiltration.
Distribution MethodMalicious web links, Malicious Files, Malicious E-Mails
Detection Tool See If Your System Has Been Affected by Metamorfo

Malware Removal Tool

User ExperienceJoin Our Forum to Discuss Metamorfo.

Metamorfo – How Does It Infect

Security experts signal that a new threat known as the Metamorfo Trojan is infecting computer users in Brazil. According to the reports the primary distribution method is the use of SPAM email messages. Usually they contain social engineering elements that coerce the recipients into installing the dangerous threat. In most cases it can be either hyperlinked in the body contents or attached directly to the messages. They are also the most common carriers for viral payloads, two of the most popular types are the following:

  • Infected Software Installers — The dangerous code is embedded in applications that are used by many users. Examples include office and productivity applications, creativity suites, system utilities and others.
  • Infected Documents — Using the same strategy the hackers can integrate the code in documents of different types: rich text documents, spreadsheets or presentations. The code is activated through interaction with the built-in macros (scripts). When the files are opened a notification prompt appears that asks (Read more...)

*** This is a Security Bloggers Network syndicated blog from How to, Technology and PC Security Forum authored by Martin Beltov. Read the original post at: