You're in: Panda Security > Home Users > security-info > about-malware > encyclopedia > overview
Active Scan. Scan your PC free
Download Cloud Antivirus Gratis

Virus Encyclopedia

Welcome to the Virus Encyclopedia of Panda Security.

Apmebf

Threat LevelLow threatDamageHighDistributionNot widespread
Common name:Apmebf
Technical name:Cookie/Apmebf
Threat level:Medium
Alias:commission junction, cj.com
Type:Cookie
Effects:   It is a small text file stored on the computer when visiting web pages. Though it does not pose a risk by itself, malicious use by other software could threaten affected users' privacy. It captures certain information entered or saved by the user, with the corresponding threat to privacy. It causes the loss of information stored on the computer, either specific files or data in general. It affects the productivity of the computer, the network to which it’s connected or other remote sites. It carries out actions that decrease the security level of the computer. It does not spread automatically using its own means.
First detected on:April 29, 2005
Detection updated on:May 2, 2006
StatisticsNo

Brief Description 

    

Apmebf is a cookie.

Cookies are small text files stored in the browser on the user's computer, when visiting web pages.

Cookies store information that can be used for several purposes: to personalize web browsing, to gather demographic information about how many users visit a page, to monitor which banners are displayed to the user, etc.

These uses are not, in theory at least, malicious.

However, keep in mind that the misuse of cookies could threaten an individual's privacy.

 

Apmebf prevents access from programs to websites of several companies related with security tools (antivirus programs, firewalls, etc.).

Apmebf redirects attempts to access web pages of certain banks to spoofed pages, with the aim of logging information entered by the user in these pages.

Apmebf redirects attempts to access several web pages to a specific IP address.

 

Apmebf does not spread automatically using its own means. It needs an attacking user's intervention in order to reach the affected computer. The means of transmission used include, among others, floppy disks, CD-ROMs, email messages with attached files, Internet downloads, FTP, IRC channels, peer-to-peer (P2P) file sharing networks, etc.