Welcome to the Virus Encyclopedia of Panda Security.
It monitors user accounts when the user accesses a web page with a secure connection or a web address that contains sensitive text strings. It is downloaded to the computer when visiting a web page that exploits several vulnerabilities.
|First detected on:||March 1, 2005|
|Detection updated on:||March 21, 2005|
|Yes, using TruPrevent Technologies
Tofger.AT is a password stealer type Trojan. It monitors user accounts (user name and password) when a web page with a secure connection, which are those that begin with https://, is accessed. This kind of web pages usually belong to banking companies, etc. This Trojan also attempts capture passwords that are introduced in web addresses that contain certain text strings, such as barclays, lloydstsb, halifax, bankofamerica, etc.
Tofger.AT sends the log information to a server.
This Trojan registers itself as a BHO (Browser Helper Object), in order to be run whenever the user opens the browser Internet Explorer.
Tofger.AT is downloaded to the computer when the user accesses certain web pages that contain references to the URL that installs the adware detected as CWS.Searchmeup. The web page uses several exploits, such as LoadImage, ByteVerify and MhtRedir.gen, in order to download malware to the computer.
Tofger.AT is difficult to recognize, as it does not display any messages or warnings that indicate it has reached the computer.