x
48h OFFER
If you're already a customer of
our homeusers protection,
renew now with a 50% off
RENEW NOW
x
SPECIAL OFFER
If you're already a customer of
our homeusers protection,
renew now with a 50% off
RENEW NOW
x
HALLOWEEN OFFER
take advantage of our
terrific discounts
BUY NOW AND GET A 50% OFF
x
CHRISTMAS OFFER
Buy the best antivirus
at the best price
BUY NOW AND GET A 40% OFF
x
SPECIAL OFFER
Buy the best antivirus
at the best price
BUY NOW AND GET A 50% OFF
x
BLACKFRIDAY OFFER
Buy the best antivirus
at the best price
TODAY ONLY UP TO 70% OFF
x
CYBERMONDAY OFFER
Buy the best antivirus
at the best price
(Only for homeusers)
TODAY ONLY UP TO 70% OFF
Active Scan. Scan your PC free
Panda Protection

Virus Encyclopedia

Welcome to the Virus Encyclopedia of Panda Security.

Encyclopedia GetVirusCard True 0

School

 
Threat LevelModerate threatDamageHighDistributionNot widespread
Common name:School
Technical name:Bck/School
Threat level:Low
Type:Trojan
Effects:   It allows to get into the affected computer. It does not spread automatically using its own means.
Affected platforms:

Windows XP/2000/NT/ME/98/95

Detection updated on:March 19, 2003
StatisticsNo

Brief Description 

    
Trojan.SubSeven.1.9 is a remote access Trojan belonging to the Trojan SubSeven family. Like all of those programs, it allows a client-server connection which is not visible to users as it is hidden within a TCP/IP connection.

The Trojan allows malicious users to access other computers remotely. This means that those users will be able to perform some actions on the victim computer. These actions will be carried out in such a way that users will not be aware.

Visible Symptoms 

    

Although affected users might not be aware of the actions carried out at a first stage, malicious users can actually access systems remotely. Some of the actions below can be carried out:

  • Opens the closes the CD-ROM tray.


  • Carries out some actions to make it more difficult to detect


  • Protects access to the server with a password.


  • It turns the victim computer off.


  • Causes the affected computer to hang


  • Accesses confidential user information.


  • Disables passwords.


  • Takes control of the keyboard and performs keylogging actions.


  • Closes applications currently open.


  • Sends out messages.


  • Opens a chat sessions.


  • Opens the Internet browser at a specific URL.


  • Runs certain programs.


  • Takes control of the mouse


  • Hides/shows the task bar.


  • Captures screeenshots.


  • Turns the monitor on/off.


  • Changes the system date/time stamp.


  • Changes the default wallpaper .


  • Carries out all types of actions with files and folders (open, close, copy, delete, etc...).



Moreover, the client sends out the follwing message to the server: