Trojan:W32/Needy is a Java-applet based program that changes the Internet Explorer start page and search settings to ones contained in the trojan.
To remove Needy.A from your system apply the fix to the Java VM vulnerability, clear temporary Internet files cache and remove the Internet Explorer settings modifications using IE Internet options menu.Further information about the vulnerability in the Microsoft Java VM, including a fix, is available at: http://www.microsoft.com/technet/security/bulletin/ms03-011.asp
A False Positive is when a file is incorrectly detected as harmful, usually because its code or behavior resembles known harmful programs. A False Positive will usually be fixed in a subsequent database update without any action needed on your part. If you wish, you may also:
Check for the latest database updates
First check if your F-Secure security program is using the latest updates, then try scanning the file again.
Submit a sample
After checking, if you still believe the file is incorrectly detected, you can submit a sample of it for re-analysis.
Note: If the file was moved to quarantine, you need to collect the file from quarantine before you can submit it.
Exclude a file from further scanning
If you are certain that the file is safe and want to continue using it, you can exclude it from further scanning by the F-Secure security product.
Note: You need administrative rights to change the settings.
Needy activates when user views a web page or HTML email that contains reference to the trojan file.
When a JAR file containing the trojan is executed it uses Microsoft Internet Explorer VerifierBug vulnerability to get full privileges by escaping the Java security, and execute its code. Then the trojan creates a temporary file for registry settings and modifies the registry using regedit.exe.The trojan modifies following registry keys:
Variant:Needy.B
This variant is functionally close to Needy.A in addition of modifying Internet Explorer search settings as Needy.A does, it also adds a list of pornographic shortcuts to browser favourite and adds a pornographic shortcut to desktop.
Variant:Needy.B
This variant is functionally close to Needy.A in addition of modifying Internet Explorer search settings as Needy.A does, it also adds a list of pornographic shortcuts to browser favourite and adds a pornographic shortcut to desktop.