Solved

atomiclog spyware found on many computers

Posted on 2006-11-28
3
179 Views
Last Modified: 2013-12-04
atomiclog was found on many computers on my network. What I am wondering is how did they get there and whats the worst possible case scenario?
0
Comment
Question by:gsco
3 Comments
 
LVL 28

Accepted Solution

by:
serialband earned 300 total points
ID: 18033231
How did it get there? Someone installed something that inclued it.  Do users have Administrative priveleges to install software?  If yes, then users downloaded and installed something that included it.  If no, then the sysadmin installed somethnig that included it, or your systems got wormed.

What's the worse case scenario?  Reinstall the OS.  Probably not necessary unless it's a system that contains confidential information and/or important data.

0
 

Author Comment

by:gsco
ID: 18040523
Well the only thing I know of that was downloaded onto many computers was the logmein.com client to remotely access certain machines across a wan.
0
 
LVL 47

Assisted Solution

by:rpggamergirl
rpggamergirl earned 200 total points
ID: 18041423
McAfee classified it as Adware, comes bundled when you installed other legit apps. It must've come with your logmein.com if that was the only apps you installed.
http://vil.nai.com/vil/content/v_131085.htm


AtomicLog removal tool:
http://www.spywareremove.com/removeAtomicLog.html

0

Featured Post

Enterprise Mobility and BYOD For Dummies

Like “For Dummies” books, you can read this in whatever order you choose and learn about mobility and BYOD; and how to put a competitive mobile infrastructure in place. Developed for SMBs and large enterprises alike, you will find helpful use cases, planning, and implementation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

As I write this article, I am finishing cleanup from the Qakbot virus variant found in the wild on April 18, 2011.  It was a messy beast that had varying levels of infection, speculated as being dependent on how long it resided on the infected syste…
No security measures warrant 100% as a "silver bullet". The truth is we also cannot assume anything but a defensive and vigilance posture. Adopt no trust by default and reveal in assumption. Only assume anonymity or invisibility in the reverse. Safe…
This Micro Tutorial hows how you can integrate  Mac OSX to a Windows Active Directory Domain. Apple has made it easy to allow users to bind their macs to a windows domain with relative ease. The following video show how to bind OSX Mavericks to …
Finds all prime numbers in a range requested and places them in a public primes() array. I've demostrated a template size of 30 (2 * 3 * 5) but larger templates can be built such 210  (2 * 3 * 5 * 7) or 2310  (2 * 3 * 5 * 7 * 11). The larger templa…

810 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question