1. /
  2. Security Response/
  3. Backdoor.IRC.Zcrew

Backdoor.IRC.Zcrew

Risk Level 1: Very Low

Discovered:
February 13, 2003
Updated:
February 13, 2007 11:43:02 AM
Also Known As:
IRC/Flood.bi [McAfee], Backdoor.IRC.Zcrew [Kaspersky
Type:
Trojan Horse
Systems Affected:
Windows 2000, Windows 95, Windows 98, Windows Me, Windows NT, Windows XP

Backdoor.IRC.Zcrew is a backdoor Trojan Horse that is similar to other backdoor IRC Trojans, such as Backdoor.IRC.Aladinz and Backdoor.IRC.Flood.

Backdoor.IRC.Zcrew is written as an IRC script and uses the mIRC client to connect to the Internet, where it notifies the attacker of its presence. The hacker can send various commands to an infected computer and take full control over it.

An infected computer can also be used to launch a ping flood attack against another computer at a specified IP address.

Antivirus Protection Dates

  • Initial Rapid Release version February 14, 2003
  • Latest Rapid Release version December 17, 2014 revision 017
  • Initial Daily Certified version February 14, 2003
  • Latest Daily Certified version December 18, 2014 revision 003
  • Initial Weekly Certified release date February 19, 2003
Click here for a more detailed description of Rapid Release and Daily Certified virus definitions.

Threat Assessment

Wild

  • Wild Level: Low
  • Number of Infections: 0 - 49
  • Number of Sites: 0 - 2
  • Geographical Distribution: Low
  • Threat Containment: Easy
  • Removal: Moderate

Damage

  • Damage Level: Medium

Distribution

  • Distribution Level: Low
Note: On May 14, 2015, modifications will be made to the threat write-ups to streamline the content. The Threat Assessment section will no longer be published as this section is no longer relevant to today's threat landscape. The Risk Level will continue to be the main threat risk assessment indicator.
Writeup By: Jason Pan

Search Threats

Search by name
Example: W32.Beagle.AG@mm
STAR Antimalware Protection Technologies
Internet Security Threat Report