Malware Detection and Actions
When the Bitdefender AntiMalware engine identifies a malware threat in any attachment of the original message, it labels the message as infected. To safeguard the recipient, Axigen replaces the original message with an informative text.
If you believe this action was inappropriate, please reach out to the message sender and request them to resend the message with all attachments included in a password-protected archive.
Threat Types
THREAT-TYPE-VIRUS
This indicates that the object is a legitimate file that has been infected by a virus. While some infected files can be disinfected and provided to the user, certain types of infections, such as Trojans, cannot be disinfected. It is important to note that viruses are unique in their ability to replicate themselves.
THREAT-TYPE-SPYWARE
This signifies that the object is a spyware application, which falls under a broad category of malicious software. Spyware applications engage in various malicious activities, such as stealing passwords and credit card information, generating false security alerts, and unauthorized monitoring.
THREAT-TYPE-ADWARE
This denotes that the object is an adware application. Adware is a type of malicious software designed to display advertisements on the user's desktop or web browser. It is often used to track user browsing habits and deliver targeted ads. Some adware may be installed with user consent, while others are installed without consent.
THREAT-TYPE-DIALER
This code indicates that the object is a dialer application. Dialers use the computer's modem to dial premium-rate numbers, often resulting in exorbitant charges. They typically do not provide clear information about the actual cost of the calls. Dialers may be installed with user consent but pose significant financial risks.
THREAT-TYPE-APP
This signifies that the object is a potentially malicious application frequently used for nefarious purposes by third parties. Although the application itself may not be inherently malicious, it carries a higher risk of being utilized for malicious activities and is often installed without user consent. Examples include web proxies, remote administration software, and similar applications.
THREAT-TYPE-APP
This signifies that the object is a potentially malicious application frequently used for nefarious purposes by third parties. Although the application itself may not be inherently malicious, it carries a higher risk of being utilized for malicious activities and is often installed without user consent. Examples include web proxies, remote administration software, and similar applications.
THREAT-TYPE-NEEDSANDBOX
This signifies that the object is a potentially malicious application frequently used for nefarious purposes by third parties. Although the application itself may not be inherently malicious, it carries a higher risk of being utilized for malicious activities and is often installed without user consent. Examples include web proxies, remote administration software, and similar applications.