$ 11.99|https://store.pandasecurity.com/300/purl-vpn?currencies=USS&x-track=55499&cart=iA001PVPNS05&language=en&quantity=1&enablecoupon=false&coupon=1STMOFFPD&x-coupon=1STMOFFPD&x-market=usa&x-track=190478|$ 0.00|$;PREFIX;.;,;11;99;0;00

It ends in:

Days Hours Minutes

It ends in:

Days Hours Minutes

The best protection with a 60% discount

Apply discount

Get 40% discount! Discover the plan that suits you best!

See offer

Get 40% discount! Discover the plan that suits you best!

See offer

Renew and get 50% off*

Only available for 48 hours!

::

*For home users only

Renew at a discount
::

Renew and get 50% off*

Renew
*Home users only

*For home users only Renew and get 50% off*

::
Renew

Special offer: Renew and get 50% off**

Only available for 48 hours!

::

*For home users only

Renew at a discount

*For home users only Special offer: Renew and get 50% off*

::04
Renew

Hello!

You’re about to visit our web page in English
Would you like to continue?

Yes, I want to visit the web page in English No, I want to visit the web page in

If this is not what you’re looking for,

Visit our Welcome Page!

Call us 24/7 and get a free diagnosis 951 203 528

Active Scan. Scan your PC free

Virus Encyclopedia

Welcome to the Virus Encyclopedia of Panda Security.

Brontok.A

 
Threat LevelHigh threatDamageSevereDistributionNot widespread
Common name:Brontok.A
Technical name:W32/Brontok.A.worm
Threat level:Medium
Alias:Win32.Worm.Robknot.A,
Type:Worm
Effects:   It spreads and affects other computers.
Affected platforms:

Windows 2003/XP/2000/NT/ME/98/95

First detected on:Oct. 10, 2005
Detection updated on:Aug. 25, 2009
StatisticsNo
Proactive protection:
Yes, using TruPrevent Technologies

Brief Description 

    

Brontok.A is a worm that spreads by copying itself, without infecting other files.

 

Brontok.A uses the following propagation or distribution methods:

  • Exploiting vulnerabilities with the intervention of the user: exploiting vulnerabilities in file formats or applications. To exploit them successfully it needs the intervention of the user: opening files, viewing malicious web pages, reading emails, etc.
  • Email: sending emails that include a copy of itself as an attachment. The computer is infected when the attachment is run.

 

ARE YOU FACING ANY PC OR INTERNET RELATED PROBLEMS?
FREE SUPPORT INCLUDED. CALL US 24/7

powered by Anytech365