BloodhoundV2 Trojan Horse
|
BloodhoundV2 Trojan Horse or simply Bloodhound Trojan, is a special protocol carried out by Norton AntiVirus whenever an unknown or un-treatable Trojan Horse is detected from within a personal computer system. Background The most common misconception, especially amongst people with very limited knowledge on how personal computers work, is that the "Bloodhound Virus," the name of the process, is a computer virus. What is referred to as the 'Bloodhound' is a protocol undertaken by Norton AntiVirus whenever an unknown or uncharted virus has been discovered. Viruses that have not been discovered yet by Norton are referred to as 'Bloodhound" viruses, therefore naming the viruses after this protocol, but that is not to say that the process itself is a virus. There is no exact date on when the first Bloodhound protocol was activated, programmers generally agree that is was sometime around 2004-2005. File Names There are various former bloodhound viruses and many still true un-discovered bloodhounds out there. The most commonly found bloodhound today is a file named Bloodhound.Exploit, usually after the word Exploit, a single, double, or triple digit is found. For example, Bloodhound.Exploit.24, the 24th version of the Trojan. However not all Bloodhound Viruses are called that, some have entirely different names like for example: 7182.exe Burst.exe Cindy.exe Cpunuttm.exe Darlene.exe and another common one is to tamper with Norton Antivirus's preferences.<ref name="pchell1"/> Less common ways of removal can be done through msconfig, simply by de-activating the virus from your start up options.
|