Related blog content
Polazert Trojan using poisoned Google Search results to spread
Trojan.Polazert is Malwarebytes’ detection name for a .NET Remote Access Trojan (RAT) that acts as a backdoor.
Trojan.Polazert adds shortcuts to the Startup folder and changes existing shortcuts on the victim’s computer to gain persistence.
There are several campaigns that distribute Trojan.Polazert. In general they use SEO and social engineering to get victims to download the RAT disguised as a document.
Trojan.Polazert is specifically designed to steal credentials from browsers and provide the attacker with a backdoor to further compromise infected systems. To achieve this collected data are sent to a C&C server.
The backdoor component of Trojan.Polazert can be used to install further malware on the infected system. As of yet there is no fixed follow-up payload.
Malwarebytes protects users from Trojan.Polazert by using real-time protection.
Malwarebytes can detect and remove Trojan.MalPack.GS without further user interaction.
You can use the Malwarebytes Anti-Malware Nebula console to scan endpoints.
Choose the Scan + Quarantine option. Afterwards you can check the Detections page to see which threats were found.
On the Quarantine page you can see which threats were quarantined and restore them if necessary.
Select your language