Welcome to the Virus Encyclopedia of Panda Security.
Clicker.ARB allows hackers to get into and carry out dangerous actions in affected computers, such as capturing screenshots, stealing personal data, etc.
It avoids being detected by the user by using the following techniques:
- It injects itself into running processes so that no unusual processes are seen.
- It deletes the original file from which it was run once it is installed on the computer.
It affects productivity, preventing tasks from being carried out:
- It causes system slowdowns.
It causes a loss of productivity in the local network to which the compromised computer belongs:
- It generates a large amount of network activity and consumes bandwidth.
It reduces the security level of the computer:
- It terminates processes belonging to security tools, such as antivirus programs and firewalls, leaving the computer defenseless against attacks from other malware.
- It changes the security settings of Internet Explorer, decreasing its security level.
Means of transmission
Clicker.ARB does not spread automatically using its own means. It needs the attacking user's intervention in order to reach the affected computer. The means of transmission used include, among others, floppy disks, CD-ROMs, email messages with attached files, Internet downloads, FTP, IRC channels, peer-to-peer (P2P) file sharing networks, etc.
Clicker.ARB has the following additional characteristics:
- It is 27648 bytes in size.