Trojan.PasswordStealer

Short bio

Trojan.PasswordStealer is a generic detection for applications that may run in the background and silently collect information about the system, connected users, and network activity. Trojan.PasswordStealer may attempt to steal stored credentials, usernames and passwords and other personal and confidential information. This information may be transmitted to a destination specified by the author. Trojan.PasswordStealer may allow an attacker to install additional software to the infected machine, or may direct the infected machine to participate in a malicious botnet for the purposes of sending spam or other malicious activities.

Symptoms

Trojan.PasswordStealer may run silently in the background and may not provide any indication of infection to the user. Trojan.PasswordStealer may also disable Antivirus programs and other Microsoft Windows security features.

Type and source of infection

Trojan.PasswordStealer may be distributed using various methods. This software may be packaged with free online software, or could be disguised as a harmless program and distributed by email. Alternatively, this software may be installed by websites using software vulnerabilities. Infections that occur in this manner are usually silent and happen without user knowledge or consent.

Protection

Malwarebytes protects users from Trojan.PasswordStealer by using real-time protection.

block Trojan.PasswordStealer

Malwarebytes blocks Trojan.PasswordStealer

Remediation

Malwarebytes can detect and remove many Trojan.Password infections without further user interaction.

  1. Please download Malwarebytes to your desktop.
  2. Double-click mb3-setup-consumer-{version}.exe and follow the prompts to install the program.
  3. Then click Finish.
  4. Once the program has fully updated, select Scan Now on the Dashboard. Or select the Threat Scan from the Scan menu.
  5. If another update of the definitions is available, it will be implemented before the rest of the scanning procedure.
  6. When the scan is complete, make sure that all Threats are selected, and click Remove Selected.
  7. Restart your computer when prompted to do so.

Cybersecurity info you can’t do without

Want to stay informed on the latest news in cybersecurity? Sign up for our newsletter and learn how to protect your computer from threats.

Select your language