Skip to main content


Home Occamy

Occamy

Also known as: Occamy.A, Trojan/Occamy.AA, Trojan/Occamy.C

Category: Malware

Type: Trojan

Platform: Primarily Windows

Variants: Trojan.Win32.OCCAMY.USXVPFA19, Trojan.Win32.OCCAMY.USXVPAS20, Trojan.Win32.OCCAMY.USXVPB, Trojan.Win32.OCCAMY.USXVPBC20, Trojan.Win32.OCCAMY.AMN, Trojan.Win32.OCCAMY.USASHDF20, Trojan.Win32.OCCAMY.USXVPC820, PUA.Win32.Occamy.USASHDF20, Trojan.Win32.OCCAMY.USASHAG20, Trojan.Win32.OCCAMY.USASHDH20, Trojan.Win32.OCCAMY.USXVPAN, Trojan.Win32.OCCAMY.USXVPBB20, Trojan.Win32.OCCAMY.USXVPB620, Trojan.Win32.OCCAMY.USXVPB720, Trojan.Win32.OCCAMY.USXVPK119, Trojan.Win32.OCCAMY.AMQ, Trojan.Win32.OCCAMY.KNXBA20, Trojan.Win32.OCCAMY.USXVPBT20, Trojan.Win32.OCCAMY.USXVPCB20, Trojan.Win64.Occamy.WLDC, Win32/Occamy.C17, Win32/Occamy.C!MTB, MacOS/Occamy.C, Trojan/Win32.Agent.C3252505,

Damage potential: Unauthorized access, theft of sensitive information, modified system files, disabled security software, man-in-the-middle attacks.

Overview

Occamy is trojan malware that modifies core system files, which lets hackers slip into a network, turn off security protections, and steal confidential data. It also creates vulnerabilities for other malicious software. Usually, users download Occamy by clicking on infected links or attachments in phishing emails, visiting malicious websites, or downloading bundled software from untrusted sources. Occamy uses sneaky techniques to bypass security controls, so it can be difficult to detect, allowing it to cause ongoing financial and reputational damage to the victim.

Possible symptoms

The main symptom of an Occamy-infected system is increased CPU usage due to hidden processes in the background. It causes a device to slow down significantly. However, other signs of Occamy malware to watch out for include:

  • Strange pop-ups and ads.
  • New, unfamiliar applications that appear without the user's initiative.
  • Disabled security software.
  • Changes in system settings.
  • Missing files.
  • Random browser redirects to unknown websites.

Sources of the infection

Occamy usually sneaks into a user's device through phishing emails containing malware-infected attachments and URLs. Victims click on these attachments or links and unknowingly download the malware. In addition to phishing emails, users often download Occamy from pirated websites with bundled software. This pesky trojan can also hide in malicious ads or drive-by downloads on malicious websites.

Protection

Occamy can quickly disrupt personal systems and organizational operations. Follow the tips below to stay protected online.

  • Don't click on unfamiliar links or attachments. Never open URLs and files from unfamiliar sources — they might be infected with malware and viruses.
  • Use email filtering tools. Email filters will send spam and suspicious emails to the spam folder before they reach your inbox.
  • Keep your apps and software up to date. The latest system updates contain patches for known vulnerabilities.
  • Use Threat Protection Pro™. NordVPN's Threat Protection Pro™ is an antivirus tool designed to secure your browsing and protect you from phishing attacks, scams, malicious websites, and fishy ads. Plus, it scans your downloads for viruses.
  • Scan removable media. Check your external devices like USBs and memory cards for viruses before you open the files stored on them.
  • Use strong passwords. Create complex and unique passwords for your accounts. Make sure they contain numbers and special characters, and avoid reusing the same passwords on multiple accounts.

Removal

If you suspect your system is infected with Occamy, immediately disconnect from the internet. Restart your computer in safe mode — this should stop the malware from loading. Then, run a thorough antivirus scan and remove any threats. If you have technical knowledge and know what to look for, delete unfamiliar files and registry entries from your computer. Once Occamy is gone for good, take care of your most important accounts and change their passwords.

However, if the malware persists or you're unsure how to remove it, contact a cybersecurity professional. They will securely remove Occamy from your computer and restore any damaged software.