Kedi Trojan Removal — Identify and Delete Active Infections

The Kedi Trojan is a newly discovered malware that is being distributed worldwide that uses Gmail to communicate with the hacker-controlled servers. The code analysis reveals that it is a complex computer virus that can be used in many infiltration scenarios. Read our in-depth article about its capabilities and how to remove active infections.

Threat Summary

NameKedi Trojan
TypeTrojan
Short DescriptionThe Kedi Trojan is a utility malware that is designed to silently infiltrate computer systems, active infections will spy on the victim users.
SymptomsThe victims may not experience any apparent symptoms of infection.
Distribution MethodFreeware Installations, Bundled Packages, Scripts and others.
Detection Tool See If Your System Has Been Affected by Kedi Trojan

Download
Malware Removal Tool

User ExperienceJoin Our Forum to Discuss Kedi Trojan.

Kedi Trojan – Distribution Methods

The Kedi Trojan is a new weapon used by computer criminals to infect users all around the world. At the moment the primary method of distribution is the use of phishing email messages. The captured samples indicate that the malicious users behind it attempt to confuse the recipients into believing that they have received a legitimate message from a well-known company. The goal is to deliver an infected payload to the users. They can be either attached directly or linked in the body contents.

In addition the payload files can also be uploaded to hacker-created sites. They are made by taking the web design elements of well-known portals or vendors and uploading the files to it.

There are two main types of malicious payloads that are being used to the Kedi Trojan:

  • Infected Software Installers — The hackers can take the legitimate setup files of famous applications and modify them to include the Kedi Trojan code. In this particular case the attacks target a (Read more...)

*** This is a Security Bloggers Network syndicated blog from How to, Technology and PC Security Forum | SensorsTechForum.com authored by Martin Beltov. Read the original post at: https://sensorstechforum.com/kedi-trojan-removal-identify-delete-active-infections/