Generic.Trojan.Injector.DDS s Malwarebytes’ detection name for Trojans that inject themselves into other processes or files, detected by Malwarebytes’ Katana engine.
The detection names are produced by Malwarebytes 4 and Malwarebytes business products. These generic malware detections are due to our new automated signature system called BytesTotal and specifically the DDS engine that are based on Machine Learning technology with 100% autonomous learning which don’t require any human interaction to correctly identify malware. These techniques are part of Malwarebytes’ Katana engine and were developed for automated mass detection of wide ranges of malware and adware.
Type and source of infection
Generic.Trojan.Injector.DDS inject their code into other processes or files, which is n effective method to hide from the average user as they will only see the regular active processes. The payload of these Trojans can vary from gathering information about the infected system to downloading and installing additional malware.
Common infection methods for Trojans include: – Downloading cracked applications or keygens – Downloading unknown free programs (games, screensavers, and simple, entertainment-related applications) – Opening infected attachments and macros – Opening an image or other type of file that is in reality an executable with a changed extension – Visiting websites that have been compromised or set up to infect users. This can also be a result of third-party content such as malvertising
The Malwarebytes’ Katana engine detects unknown threats as Generic.Trojan.Injector.DDS by using generic detections, Machine Learning, and other Artificial Intelligence techniques to protect users from malware that has not yet been classified.