1. /
  2. Security Response/
  3. Backdoor.Cycbot


Risk Level 1: Very Low

October 30, 2010
November 3, 2010 2:49:53 AM
Also Known As:
Troj/Agent-PEW [Sophos], Troj/Agent-PFM [Sophos], Troj/FakeAv-BWP [Sophos], Troj/Agent-PIP [Sophos], Troj/DwnLdr-IPT [Sophos], Troj/FakeAV-BZD [Sophos], Troj/Cycbot-B [Sophos], Troj/FakeDpr-A [Sophos], Troj/Agent-PKI [Sophos], Troj/Agent-PKJ [Sophos], Troj/Agent-PKH [Sophos], Troj/Mdrop-DBD [Sophos], Troj/Agent-PLE [Sophos], Troj/FakeAV-CAL [Sophos], Troj/FakeAV-CAK [Sophos], Troj/Proxy-JY [Sophos], Troj/FakeAV-CAW [Sophos], Troj/FakeAV-CAV [Sophos], Troj/FakeAV-CAX [Sophos], Troj/FakeAV-CBU [Sophos], Troj/FakeAV-CDG [Sophos], Troj/Katusha-J [Sophos]
Infection Length:
105,472 bytes
Systems Affected:
Windows 2000, Windows 7, Windows 95, Windows 98, Windows Me, Windows NT, Windows Server 2003, Windows Server 2008, Windows Vista, Windows XP
Backdoor.Cycbot is a Trojan horse that opens a back door on the compromised computer.

For more information, please see the following resources:
Blogs relating to Backdoor.Cycbot

Antivirus Protection Dates

  • Initial Rapid Release version October 30, 2010 revision 002
  • Latest Rapid Release version May 1, 2015 revision 035
  • Initial Daily Certified version pending
  • Latest Daily Certified version May 2, 2015 revision 001
  • Initial Weekly Certified release date November 3, 2010
Click here for a more detailed description of Rapid Release and Daily Certified virus definitions.

Threat Assessment


  • Wild Level: Low
  • Number of Infections: 0 - 49
  • Number of Sites: 0 - 2
  • Geographical Distribution: Low
  • Threat Containment: Easy
  • Removal: Easy


  • Damage Level: Medium
  • Payload: Sets up a local proxy and opens a back door.


  • Distribution Level: Low
Note: On May 14, 2015, modifications will be made to the threat write-ups to streamline the content. The Threat Assessment section will no longer be published as this section is no longer relevant to today's threat landscape. The Risk Level will continue to be the main threat risk assessment indicator.
Writeup By: Nino Fred Gutierrez, Kazumasa Itabashi, and Eoin Ward

Search Threats

Search by name
Example: W32.Beagle.AG@mm
STAR Antimalware Protection Technologies
Internet Security Threat Report