Trojan.Autoproxy
Description
This indicates detection of autoproxy trojan activity.
The Autoproxy trojan can install itself on a host as a proxy server by taking advantage of a Microsoft Internet Explorer OBJECT tag vulnerability. An infected system will try to contact a "master server" for commands to possibly infect other hosts.
Affected Products
Any unprotected system running Internet Explorer without the correct patch is vulnerable to the attack.
Impact
System compromise.
Recommended Actions
Apply the appropriate patches or upgrade the system to the latest non-vulnerable version
Coverage
| IPS (Regular DB) | |
| IPS (Extended DB) |
Version Updates
| Date | Version | Status | Detail |
|---|---|---|---|
| 2020-12-02 | 16.972 |
Removed
|