Flysky.R is a virus that spreads to other computers by copying its code to other files or programs.
It captures certain information entered or saved by the user, with the corresponding threat to privacy:
It sends the gathered information to a remote user by any available means: email, FTP, etc.
It reduces the security level of the computer:
it notifies the attacker that the computer has been compromised and is ready to be used maliciously.
It uses stealth techniques to avoid being detected by the user:
- It deletes the original file from which it was run once it is installed on the computer.
Flysky.R does not spread automatically using its own means. It needs an attacking user's intervention in order to reach the affected computer. The means of transmission used include, among others, floppy disks, CD-ROMs, email messages with attached files, Internet downloads, FTP, IRC channels, peer-to-peer (P2P) file sharing networks, etc.
Flysky.R uses the following infection strategies:
- Resident: once it has been run, the virus goes memory resident and stops functions belonging to the operating system. Therefore, every time the operating system or an application tries to access any of these functions, the virus will activate and infect new files.