1. Symantec/
  2. Security Response/
  3. Backdoor.Optix

Backdoor.Optix

Risk Level 1: Very Low

Discovered:
December 11, 2001
Updated:
February 13, 2007 11:38:04 AM
Also Known As:
TROJAN_OPTIXKILL
Type:
Trojan Horse

Backdoor.Optix is a backdoor Trojan program that was written in the Delphi language.



If a backdoor Trojan was successfully installed on the computer, it is possible that your system has been accessed remotely by an unauthorized user. For this reason it is impossible to guarantee the integrity of a system that has had such an infection. The remote user could have made changes to the system, including but not limited to the following:
  • Stealing or changing passwords or password files
  • Installing remote-connectivity host software, also known as backdoors
  • Installing keystroke logging software
  • Configuring firewall rules
  • Stealing credit card numbers, banking information, personal data, and so on
  • Deleting or modifying files
  • Sending inappropriate or even incriminating material from a customer's email account
  • Modifying access rights on user accounts or files
  • Deleting information from log files to hide such activities

To be certain that your organization is secure, you must reinstall the operating system, restore files from a backup that was made before the infection took place, and change all passwords that may have been on the infected computers or that were accessible from it. This is the only way to ensure that your systems are safe. For more information regarding security in your organization, contact your system administrator.

Antivirus Protection Dates

  • Initial Rapid Release version December 26, 2001
  • Latest Rapid Release version December 4, 2017 revision 006
  • Initial Daily Certified version December 26, 2001 revision 003
  • Latest Daily Certified version December 4, 2017 revision 021
  • Initial Weekly Certified release date December 26, 2002
Click here for a more detailed description of Rapid Release and Daily Certified virus definitions.
Writeup By: Neal Hindocha

Search Threats

Search by name
Example: W32.Beagle.AG@mm
STAR Antimalware Protection Technologies
2016 Internet Security Threat Report, Volume 21
  • Twitter
  • Facebook
  • LinkedIn
  • Google+
  • YouTube