This Trojan is sneaky. It stores its own code within the registries, which allows it to remain in a computer. However, none of its files are stored on a computer file system, thus, making it very difficult to detect.
After the Trojan is installed, it may contact its command and control (C&C) servers to download further instructions. Its main goal is to perform click-fraud operations, which will covertly download large number of online advertisements onto compromised computers and then automatically clicking or interacting with them to fraudulently earn revenue for the attacker.
Things seem to have gotten worse. Poweliks is now linked to ramsomware attacks especially Cryptowall, and is troubling to victims, but profitable for the attackers.
In the click-fraud attacks perpetuated by Poweliks, victims are basically unaware that ads based on keywords are requested; it is made to seem that the victim searched for the selected keywords, and then allows the attackers to receive money. As the selected ads are not shown to the victim, they are unaware of Poweliks’ presence on their computer.
Poweliks can request as many as 3,000 ads per day on a computer. With this high number of request for ads, it could eventually download malicious ads onto the victim’s computer that may cause other malware to be installed, such as Cryptowall ransomware. In such a case, the victims are initially unaware that Poweliks was displaying ads on their computers, and they then get locked out of their computers while being prompted to pay a ransom.