IceID Trojan – How to Remove It and Protect Your Network

This article has been created in order to explain what is the IcedID Trojan and how to remove this malware completely from your computer.

The IceID Trojan is an advanced banking Trojan that is being used in large-scale attacks across the world. It is being operated by two experienced criminal groups, one of which is responsible for TrickBot. Active infections modify the target victim targets in such a way that it is impossible to remove the strains with the ordinary manual instructions. Refer to our removal instructions for a detailed instruction on recovering your PC.

Threat Summary

NameIceID Trojan
TypeTrojan Horse Virus
Short DescriptionSilently infects the target machines and modifies key applications and system services.
SymptomsThe user may not experience any signs of infiltration.
Distribution MethodMalicious web links, Malicious Files, Malicious E-Mails
Detection Tool See If Your System Has Been Affected by IceID Trojan

Malware Removal Tool

User ExperienceJoin Our Forum to Discuss IceID Trojan.

IcedID – How Does It Infect

The IceID Trojan is being distributed at computer users worldwide in targeted attacks. The security analysis reveals that the hacker-controlled campaigns are specifically customized in order to affect as many targets as possible. The first instances of the threat were spotted last year by security researchers when the first attacks happened.

The initial attacks make use of the Emotet payload downloader using bulk email messages that contain social engineering elements. As one of the primary strategies overall this has allowed the IceID to be bundled with other malicious threats. A distinct characteristic of the IceID Trojan attacks is that it appears that the current attack seem to be organized with the criminal collective behind TrickBot. The two groups are working together in order to infect as many hosts as possible. This is (Read more...)

*** This is a Security Bloggers Network syndicated blog from How to, Technology and PC Security Forum authored by Martin Beltov. Read the original post at: