Hello!
You’re about to visit our web page in English
Would you like to continue?
If this is not what you’re looking for,
Virus Encyclopedia
Welcome to the Virus Encyclopedia of Panda Security.
Proxy.O | |
Threat Level Damage Distribution |
Effects |
Proxy.O allows hackers to get into and carry out dangerous actions in affected computers, such as capturing screenshots, stealing personal data, etc. It uses the following techniques to impede detection by antivirus companies:
It captures certain information entered or saved by the user, with the corresponding threat to privacy:
It causes a loss of productivity in the local network to which the compromised computer belongs:
It reduces the security level of the computer:
|
Proxy.O does not spread automatically using its own means. It needs the attacking user's intervention in order to reach the affected computer. The means of transmission used include, among others, floppy disks, CD-ROMs, email messages with attached files, Internet downloads, FTP, IRC channels, peer-to-peer (P2P) file sharing networks, etc.
Proxy.O has the following additional characteristics: