Clouded Ransomware

Posted: May 5, 2017 | Category: Ransomware
The Clouded Ransomware is a Trojan that locks your files by encrypting them. Since the Trojan doesn't save the unique keys associated with this function, even paying their ransom demands will not restore your media. Most PC users should make regular backups to keep their files from being damaged from threats of this category, and various anti-malware products can quarantine or delete the Clouded Ransomware as soon as they detect it. Con artists aren't noted for their honesty particularly,...

'Super Free Music Player' App Spreads Malware onto Thousands of Android Devices

Posted: May 4, 2017 | Category: Cybersecurity
Malware found on mobile apps is a continually growing issue, especially among Android devices that may obtain apps from 3rd party sources and the Google Play Store. In the recent events of discovering malware-laden apps, we look no further than the Google Play Store at the app called Super Free Music Player, which has spread malware onto upwards of 10,000 Android devices thus far. Computer security researcher Rowland Yu, from SophosLabs, identified the malware spread through the Super...

nJoy Movies Search

Posted: May 4, 2017 | Category: Potentially Unwanted Programs (PUPs)
The nJoy Movies Search is a browser extension whose installation may not always be a good idea since users must agree to certain terms to install it. The terms can be seen in the 'Terms of Service' and the 'Privacy Policy' hosted on the nJoy Movies Search's website, and two of the points there state that users agree to use the nJoy Movies Search's new tab page, as well as that they authorize the extension to modify data on the websites they browse. This last might not seem suspicious, but it...

MyFileConvert by MyWay

Posted: May 4, 2017 | Category: Potentially Unwanted Programs (PUPs)
The MyFileConvert by MyWay is a software product of Mindspark Interactive Network, which is meant to provide users with neat access to a collection of document conversion tools that can be accessed through their Web browser directly. This tool may come in handy certainly, especially for users who deal with various, different documents on a daily basis. However, while MyFileConvert's usefulness is undoubted, users who want to install this extension may have to agree to terms that include some...

Find Pro Ads

Posted: May 4, 2017 | Category: Adware
Online advertisements have become a rather common occurrence today, and many websites rely on them to generate money that can keep the page up & running. However, certain people and companies tend to take advantage of more aggressive advertising campaigns, which ensure that their ads will be visible on every page the user browses. This is done with the help of applications that are tagged as 'adware' by anti-virus product vendors, and 'Find Pro' is one of these adware applications. When...

FailedAccess Ransomware

Posted: May 4, 2017 | Category: Ransomware
The FailedAccess Ransomware is a Trojan based on open-source code that damages your files to force you into paying a ransom. One should attempt other methods of data recovery before rewarding a harmful behavior with ransom money, which never is a surefire way of procuring the necessary decryption key. PCs protected with modern anti-malware software should be able to delete the FailedAccess Ransomware automatically, keeping it from locking any of your local content. One unfortunate reality...

Cryptoboss Ransomware

Posted: May 4, 2017 | Category: Ransomware
The Cryptoboss Ransomware is a minor revision of the Amnesia Ransomware. Both Trojans imitate the ransoming methods of the Globe Ransomware family, and also will encrypt your files, albeit with different ciphers. File-locking encryption attacks are most remediable directly with users backing up their work to other drives regularly, although free decryption tools also can reverse the payloads of these threats. For preventing file damage at all, having reliable anti-malware security is ideal...

vCrypt1 Ransomware

Posted: May 4, 2017 | Category: Ransomware
The vCrypt1 Ransomware is a Trojan that encodes your files with a XOR encryption algorithm, modifying them so as to be unreadable to their related programs. Its latest installation exploits include spam e-mails targeting Russian speakers, although its attacks can block and damage files regardless of the compromised system's language settings. Use a combination of anti-malware protection for eliminating the vCrypt1 Ransomware, along with regular backups to keep an attack from harming your...

Mamba Ransomware

Posted: May 4, 2017 | Category: Ransomware
Mamba Ransomware is among a malware family known as Dharma Ransomware, which is known for its creative method of extorting money from computer user victims. Such a method is rather common in the world of ransomware where the threat will unleash itself after a user unknowingly opening or accessing a spam email attachment or malicious download. When initiated, Mamba Ransomware will encrypt files and then give the computer user a singular option of paying a ransom in cryptocurrency to...

Donald Trampo Ransomware

Posted: May 4, 2017 | Category: Ransomware
The Donald Trampo Ransomware is a Trojan that can encrypt your files to make associated programs unable to open them. Its attacks also include substantial changes to filenames and the creation of messages asking you to contact its threat actor, which may be part of a ransom negotiation. For dealing with this threat, malware experts suggest backing up your files, using standard security protocols to prevent infections, and removing the Donald Trampo Ransomware with in-depth system scans from...

RSAUtil Ransomware

Posted: May 3, 2017 | Category: Ransomware
The RSAUtil Ransomware is a Trojan that can block your files from opening by modifying them with an encryption-based cipher. Its attacks also include creating messages requesting money to restore the files it's locking, although paying this extortionist ransom is, at best, an uncertain recovery tactic. For more guaranteed security for your data than that, malware experts suggest backing up your drive routinely and having anti-malware products for quarantining or deleting the RSAUtil...

Extractor Ransomware

Posted: May 3, 2017 | Category: Ransomware
The Extractor Ransomware is a Delphi-based Trojan that can create text-based extortion messages on your PC and block your files by modifying them with an encryption routine. The latter has the potential to render your digital media irrecoverable and prevents them from opening until you decrypt them, which requires a custom key. Use backups or help from appropriate third-party security experts to recover any blocked files after your anti-malware solutions remove the Extractor Ransomware....

SeekPriv

Posted: May 3, 2017 | Category: Potentially Unwanted Programs (PUPs)
SeekPriv is an extension that appears to be distributed with the help of shady Web pages like hxxp://hatemy.accountant and hxxp://goto.maxdealz.com. Both of these domains lead visitors to a blank page, but this is only because thse Web pages are not meant to display any content on their default directory. Instead, their authors may have set up on more directories used to host fake pages that may aim to trick users into installing the SeekPriv browser extension, or similar software. We don't...

Mikoyan Ransomware

Posted: May 3, 2017 | Category: Ransomware
The Mikoyan Ransomware is a Trojan that blocks the files in the Windows default Downloads folder by encrypting them. While its author also delivers ransoming demands for decrypting them, malware experts suggest that you use a backup or free alternatives to avoid paying this fee. Although this threat is newly-identified, updated anti-malware products should remove the Mikoyan Ransomware with few issues. Open-sourcing is a source of both great benefit and great trouble to the software...

GO Ransomware

Posted: May 3, 2017 | Category: Ransomware
The Go Ransomware is a threat that locks up files on affected computers and asks for a ransom to be provided with a decryption key. The ransom note is written in Czech, and it is located in a file named 'precist.html.' This ransomware appends the extension '.LOCKED' to the encrypted files, and it uses strong AES and RSA encryption algorithms. Each victim receives a unique ID number, which also is contained in the ransom note. The amount of the requested ransom is 0.05 Bitcoin and the...

Chrome-38.site

Posted: May 2, 2017 | Category: Browser Hijackers
Chrome-38.site is a potentially unsafe domain that may host pages related to the fraudulent 'Add Extension to Leave' pop-ups. The domains that host this content may be distributed with the help of malvertising campaigns and users may come across them while browsing low-quality websites related to shady content. The installation of these extensions may cause various issues such as the introduction of new pages to the user's settings, or more threatening actions that may put their online safety...

PentagonRAT

Posted: May 2, 2017 | Category: Remote Administration Tools
PentagonRAT is a multi-purpose Trojan suite that grants remote attackers various means of harming your PC's security, including collecting information, establishing non-consensual network connections and encrypting your files. Portions of PentagonRAT's payload can include symptoms of high visibility, such as pop-up images. Always use anti-malware security features for removing PentagonRAT before it can complete its installation when you can. A new, entrepreneur-oriented threat actor has...

Amnesia Ransomware

Posted: May 2, 2017 | Category: Ransomware
The Amnesia Ransomware is a file-encryption Trojan, which blocks files on your computer, usually to ask for money for the customized unlocking key or service. Although this Trojan exhibits symptoms traditional for the Globe Ransomware , malware experts can confirm that the Amnesia Ransomware isn't a member of this family, which may impede any free decryption solutions. Its distribution methods are unknown, but you can use standard anti-malware products and features for removing the Amnesia...

Mordor Ransomware

Posted: May 2, 2017 | Category: Ransomware
The Mordor Ransomware is a modified version of the Karmen Ransomware branch of Hidden Tear, a Trojan that encrypts the PC's local files and generates extortion-themed messages for its victims. Having up-to-date backups elsewhere is the simplest means of recovering data from this Trojan's attack, and malware experts emphasize the default risks in following any decryption advice from extortionists. Most systems with anti-malware protection should remove the Mordor Ransomware before any...

2infoblog.net

Posted: May 1, 2017 | Category: Browser Hijackers
2infoblog.net is a questionable site that been deemed as a browser hijacker by computer security experts. 2infoblog.net may offer various casino games or online games that supposedly pay out money. While the 2infoblog.net services may be enticing for some computer users, using the 2infoblog.net site may prove to be risky as it could load various advertisements or links that cause redirects to sites and content that is questionable. In the event of 2infoblog.net automatically loading or...