Trojan-BNK.Win32.Keylogger.gen is a dangerous infection, which takes an important role in the distribution of rogue anti-spyware and ransomware infections. Besides, sometimes it may be reported on fake alerts that belong to XP Internet Security 2010, Internet Security 2013, Win 7 Protection 2013 and similar threats. By reporting about different kinds of viruses, they typically try to scare their victims and then create a need of their removal services. These services may cost from $10 to $100 and in reality be worthless.
Trojan-BNK.Win32.Keylogger.gen attacks computers via security vulnerabilities found, so you should always have anti-virus and anti-spyware installed on your computer if you want to avoid this threat. Once computer gets infected, virus downloads malicious files that belong to more serious viruses that are used to swindle the money from users. You can get infected with rogue anti-spyware or ransomware with a help of Trojan-BNK.Win32.Keylogger.gen.
Another way, how you can run into Trojan-BNK.Win32.Keylogger.gen, involves fake notifications that also belong to rogues. They typically state that private data (passwords, credit card details, etc.) might be stolen because of this trojan. However, this warning is a total lie and Trojan-BNK.Win32.Keylogger.gen is reported only to scare you into thinking that you are dangerously infected.
If you are infected with Trojan-BNK.Win32.Keylogger.gen or receive the pop-up ad that reports about it, concentrate on checking your PC with updated anti-spyware. If you can't launch it, follow these steps:
1. Reboot your computer to Safe Mode with Networking. Just reboot your PC and, as soon as it starts booting up, start pressing F8 repeatedly.
2. Loggin as the same user as you were in normal Windows mode
3. Now click on IE or other browser and select 'Run As' or 'Run As administrator', enter your Administrator account password (if needed).
4. Enter this link to your address bar: http://www.2-spyware.com/download/hunter.exe and download a program on your desktop. Launch it to get rid of malicious processes.
Information added: 10/21/14 01:18;
information updated: 10/21/14 01:18