Yesterday, we warned about a new Trojan Horse that looks like an authentic Microsoft screen ordering you to â€œactivateâ€ your Windows copy, which, by the way, requires you to submit your credit card information. If you donâ€™t agree to submit the information, the Trojan Horse shuts down your computer.
We received some emails asking how to deal with this insidious threat. We offer two Symantec-endorsed solutions.
Javier Santoyo, a Symantec Security Response manager, says the easiest way to deal with this Trojan Horse is pretend to give it what it wants. Go ahead and click â€œyes,â€ and enter in false information. The Trojan Horse â€œis not doing anything malicious to your system,â€ Santoyo says. In other words, sending false information via this infestation wonâ€™t melt down your hard drive, erase your data, or otherwise kill your computer. â€œIf this were a different threat, I wouldnâ€™t recommend doing that,â€ he adds. Once youâ€™re back into your system, run an anti-virus program to remove the threat, Santoyo says.
One Tech Insider caveat: We donâ€™t think anybody should ever succumb to a phishing program, even when giving false data. Do it this time and you may get careless the next time. So, onto the next solution, which is a little technical:
Click â€œno,â€ and the computer will automatically reboot. While itâ€™s rebooting, press F8 or F12 to start the operating system in safe mode. Safe mode is a stripped down version of your operating system giving you access only to basic files.
Once in Safe Mode, you can run your antivirus software and remove the infection. Microsoft notes that â€œyou can choose the Safe Mode with Networking option,â€ which also will give you Internet access. You'll need access to update your antivirus software, which if youâ€™re infected, probably needs it.
You can also try removing the infection manually. Symantec notes that the Trojan Horseâ€™s file name is keylog.dll.
Symantec also adds this important reminder: â€œSymantec strongly recommends that you back up the registry before making any changes to it. Incorrect changes to the registry can result in permanent data loss or corrupted files. Modify the specified subkeys only. For instructions refer to the document: How to make a backup of the Windows registry."
To remove it, youâ€™ll need to open the registry editor, which you do by going to Start, Run, and typing in regedit.
Inside the registry, which is a database of all your computer's hardware and software information and settings, hit control F, and search for the file "keylog.dll." Check Match whole string only in the search box, because youâ€™re not looking for all ".dll" files, just this particular one.
When it comes up, delete it. But youâ€™re still not done, youâ€™ll have to remove the two subkeys the program has unloaded:
Notice something about where those files are? Theyâ€™ve been downloaded directly into your Microsoft Windows registry, which most people are justifiably paranoid about touching, for fear they could mess up the operating system.
The best medicine for viruses, of course, is preventative -- not getting infected in the first place. That means your computerâ€™s security settings are up to date, you are running regularly-updated anti-virus software and you refrain from downloading questionable attachments.