
It is used to spread both legitimate and pirate content.
#ANTIVIRUS VK REVIEW SOFTWARE#
Application Installers - The hackers can also create setup packages of popular software which is commonly acquired by end users.Īll executable files can also be uploaded to various file-sharing networks - the most popular one being BitTorrentt.This include spreadsheets, presentations, databases and text files. Malicious Documents - The criminals can craft documents across all popular types that will include the relevant infection scripts.The VK Virus can also be embedded in various payload carriers of which there are two main types: They are designed to pose as legitimate messages that have been sent in by the social network. The users can also receive the links via various phishing campaigns - the most common sources are the email messages and fake redirects portals. These fake sites will also include security certificates that are either self-signed or stolen. These pages are usually hosted on domain names that sound very similar to the real one.

Usually the most popular versions are malicious pages that copy the down the content of the social network.

In fact the virus files are in no way affiliated with it, they merely take advantage of the fact that the site is used by many users around the world an they will download and interact with almost every piece of software or site that may appear as part of the network.īased on this the hackers will be able to push the VK Virus samples via different methods.

The VK Virus is a family of web-based threats and executable files which all seek to coerce the victims into thinking that they have accessed a file or site that is affiliated with the popular VK (VKontakte) social network.
