Spybot Search and Destroy Definitions Updated on July 15, 2009
If you use Spybot Search and Destroy to protect your computer against spyware and malware, it is time again to run your manual updates. Malware writers are constantly modifying their programs to evade detection, so anti-malware vendors have to issue regular updates to keep up with the bad guys. New definitions and false positive fixes for Spybot Search and Destroy are usually released every Wednesday. This week's updates were released on schedule on July 15, 2009, as listed below. Some new and altered fake security programs were added to the detections, plus several new Trojans, rootkits and modified spam bots.
Updating Spybot Search and Destroy
Before you update Spybot Search and Destroy make sure you have the latest official version. Older versions are no longer supported and will cause you a lot of grief when you immunize and scan for problems. Only download Spybot S&D from the official website, at: spybot.info, or from its alternate domain: Safer-Networking.org. Fake versions with similar names will rip you off for payment to remove threats, whereas the real Spybot S&D is free (donations gladly accepted).
In case you are new to Spybot S&D, there are two ways to update the program and malware definitions. The preferred method (For Windows PCs) is to go to Start > (All) Programs > Spybot - Search & Destroy > Update Spybot - S&D. The independent update box will open. Leave the default options as is, unless you need all languages or want beta definitions, and click on "Search." Another box will open with "mirror" locations around the world where you can download updates. Select a location nearest to you from the list and click on "Continue." Make sure all updates are checked, then click on "Download." If all definitions are verified as being correct the check marks will disappear from the check boxes and be replaced with green arrow graphics. However, sometimes one or more mirror locations have not updated all of the definitions and you will get a red X for those definitions. Click on Go Back, select a different mirror, and try again. I have consistent success using Giganet or the Safer-Networking servers. When all updates have succeeded, click on "Exit."
Download links and more instructions about using Spybot Search and Destroy are in my article titled "How to use Spybot Search & Destroy to fight malware".
The description of the latest definition updates and false positive fixes are in my extended comments below.
Additions to malware definitions made on July 15, 2009:
Adware
++ Need2Find
+ RXToolbar
Dialer
++ EroDial
Keyloggers
+ ActualSpy
+ Ardamax
Malware (Includes rogue or fraudulent security programs, fake registry cleaners, and fake security alerts, plus other nasty programs)
++ Win32.Agent.na
++ Win32.Agent.pql
+ Win32.Banker
+ Win32.FraudLoad
+ Fraud.PersonalAntivirus
+ Fraud.Sysguard
++ Fraud.UltimateDefender
++ Fraud.WiniblueSoftware
++ Fraud.WiniFighter
+ Fraud.XPDeluxeProtector
+ Smitfraud-C.
++ Win32.Rbot.seh
+ Win32.Renos
+ WinWebSecurity
PUPS (Possibly UnPopular Software or Potentially Unwanted Program)
+ Hotbar
+ MyWay.MyWebSearch (Most prevalent PUP malware detection last week)
++ Turkojan
Trojans (Trojans come to you disguised as something useful, or as a missing codec required to view a spammed video, but, like the Trojan Horse of antiquity, they hold dangerous contents that cause great harm! Many of these Trojans are Botnet infections, backdoors, malicious download agents and Rootkits.)
+ PurityScan
+ Virtumonde.sci
+ Virtumonde.sdn
+ Win32.Agent.h
+ Win32.Agent.qt
++ Win32.Agent.ws
++ Win32.Dursg
+ Win32.FraudLoad.pd
+ Win32.Iksmas.ai
+ Win32.IRCBOT.cmn
++ Win32.Kolabc.ezg
+ Win32.Koobface
++ Win32.LDPinch.m
++ Win32.Monderb.aqpu
++ Win32.Podnuha.rtk
+ Win32.Rbot.fx
+ Win32.Small.azl
++ Win32.Small.rn
+ Win32.TDSS.clt
+ Win32.TDSS.dt
+ Win32.TDSS.gen
+ Win32.TDSS.pe
+ Win32.TDSS.rtk
++ Win32.VB.ruk
+ Win32.Virut.bg
+ Win32.ZBot
+ Zlob.Downloader
+ Zlob.PerfectCodec
Worm
++ Blackmail
+ Win32.Koobface
Total: 1467822 fingerprints in 505684 rules for 4757 products.
False positive detections reported, discussed, or fixed this week:
Spybot Resident (TeaTimer) alerts on install of Advanced System Care and terminates the process. This is being investigated as a probable false positive.
Heuristic detections of infections in regsvr32.exe and rundll32.exe are false positives with the heuristics part of the single file scanner. A fix was released on 07-15-2009.
Spybot detecting MBAM as malware has been fixed! MalwareBytes AntiMalware is not an infection; it is the opposite! I just used to to clean up a severely infected system. Download new definitions, restart and scan again.
After you update definitions to fix false positives a restart of either TeaTimer or the Computer is required. If this doesn't fix the false positives, you may need to reset the TeaTimer detection list, as follows:
Right click the (TeaTimer) Resident tray icon
Select "Reset lists"
If that fails also, please read the rest of the things to try on this forum page, in replies #2 and #4.
When TeaTimer blocks the file you can also allow the file to be executed (also remove the check mark for deletion). You can exclude any file from further detections during a scan by right clicking the items in the Spybot S&D scan result and select "exclude this detection from further searches"
If you keep getting false positive detections and broken programs, due to TeaTimer issues, try disabling that module. You can toggle TeaTimer off and on by switching into Advanced Mode > Tools > Resident.
False Positives are reported and discussed in the Spybot S&D False Positives Forum.
As mentioned earlier, links and more instructions about using the program, or reporting suspected false positives, are found in my article titled How to use Spybot Search & Destroy to fight malware.
If you like this article please share it.
The content on this blog may be reprinted provided you do not modify the content and that you give credit to Wizcrafts and provide a link back to the blog home page, or individual blog articles you wish to reprint. Commercial use, or derivative work requires written permission from the author.