News

Trojan delivers unwanted gift to Windows PCs

Updated 6 hours ago

A new Trojan horse program was infecting PCs on Wednesday, exploiting a hole in Windows systems to sneak onto computers, then dropping adware or spyware or turning them into zombies, according to several Internet security companies.

The Trojan, dubbed Exploit-WMF (Windows Meta File), was rated a category 2 level risk, meaning it had the potential to continue to spread, said Dave Cole, director of security response at Symantec.

The exploit “is misusing a function in the WMF library in Windows,” dropping onto the machine a downloader Trojan “that pulls down its big brother, a more sophisticated Trojan” from a server on the Internet, he said.

“Then it might try to pull down adware, spyware or a bot program,” that can turn the computer into a zombie to be used for attacking other machines or sending spam, or just leave a hole on the computer through which sensitive data could be stolen, Cole said.

Kaspersky Lab rated the vulnerability “highly critical” and predicted that “new modifications of these programs may well appear in the near future.”

Full story: ZDNet News

Conclusion

This software provides valuable functionality for users. Whether for personal or professional use, it delivers on its core promises. Regular updates and active development ensure continued relevance. User satisfaction and community support demonstrate its value.

Final Thoughts

Based on its features and performance, this software is worth considering. Evaluate your specific needs and whether this solution addresses them. Try it yourself to determine if it’s the right fit for your requirements.

Key Features

Fast Performance

Optimized for speed and efficiency

Secure & Safe

Built with security in mind

Cross-Platform

Available on multiple platforms

Customizable

Personalize to fit your needs

System Requirements

Download Options

Download information coming soon. Please check back later for download links.
Important: Always download software from official sources. Scan downloaded files with antivirus software before installation.
Published Dec 29, 2005
Last Updated Nov 18, 2025