x
48h OFFER
If you're already a customer of
our homeusers protection,
renew now with a 50% off
RENEW NOW
x
HALLOWEEN OFFER
take advantage of our
terrific discounts
BUY NOW AND GET A 50% OFF
x
CHRISTMAS OFFER
Buy the best antivirus
at the best price
BUY NOW AND GET A 40% OFF
x
SPECIAL OFFER
Buy the best antivirus
at the best price
BUY NOW AND GET A 50% OFF
x
BLACKFRIDAY OFFER
Buy the best antivirus
at the best price
TODAY ONLY UP TO 70% OFF
x
CYBERMONDAY OFFER
Buy the best antivirus
at the best price
(Only for homeusers)
TODAY ONLY UP TO 70% OFF
Active Scan. Scan your PC free
Download Cloud Antivirus Gratis

Virus Encyclopedia

Welcome to the Virus Encyclopedia of Panda Security.

Briz.C

Threat LevelHigh threatDamageSevereDistributionNot widespread
Common name:Briz.C
Technical name:Trj/Briz.C
Threat level:Medium
Type:Trojan
Effects:  

It obtains confidential data from the affected computer, prevents users from accesing websites belonging to certain antivirus companies, and uses the computer as a gateway in order to connect to third-parties' services over the Internet.

Affected platforms:

Windows XP/2000/NT/ME/98/95

First detected on:March 19, 2006
Detection updated on:June 11, 2007
StatisticsNo
Proactive protection:
Yes, using TruPrevent Technologies

Brief Description 

    

Briz.C is a password stealer type Trojan that consists of several components that are consecutively downloaded from the Internet. Such components carry out the following actions:

  • Stop and disable the services Windows Security Center and Internet Connection Sharing (Windows XP firewall).
  • Obtain information from the computer, such as IP address, name, geographic area, etc.
  • Prevent users and installed programs from accessing certain websites, which belong to several antivirus companies.
  • Capture the data entered in websites containing forms accessed through Internet Explorer. This way, it obtains passwords for email accounts, banking entities and other online services.
  • Harvest paswords and other data stored in Protected Storage, as well as the email clients Outlook, Eudora and The Bat.
  • Use the affected computer as a gateway, in order to connect to third-parties' Telnet, SMTP, FTP and HTTP services anonimously.
  • Execute commands and download files from the hard disk of the affected computer.

Briz.C does not spread automatically using its own means. It needs an attacking user's intervention in order to reach the affected computer.

Visible Symptoms 

    

Briz.C is difficult to recognize, as it does not display any messages or warnings that indicate it has reached the computer.