Mar 19, 2012
Remote / Network Access,
Mobile Phone / Hand-held Device
Loss of Confidentiality
The presence of this software means the host system has been compromised through some other exploit/vulnerability. The only way to ensure the software, and any other malicious software (malware), is completely removed is to re-install the operating system.