'Error # 3658ad79cc3021a' Pop-Up

Posted: February 24, 2017 | Category: Adware
The 'Error # 3658ad79cc3021a' Pop-Up may appear in your web browser out of nowhere, and it may warn you that your system has become the target of cyber criminals or that your computer has been locked due to suspicious activity. The messages that accompany 'Error # 3658ad79cc3021a' Pop-Ups may vary because this is not an official error message and, instead, it was crafted by a group of con artists whose goal is to promote fraudulent technical support services in order to steal money from users...

'Error # S47452D' Pop-Up

Posted: February 24, 2017 | Category: Adware
The 'Error # S47452D' Pop-Up is a fraudulent message that won't just scare users by providing them with fake information regarding malware alerts or corrupted system files, but it will also cause a major annoyance by blocking the user's web browser, and prevent the user from switching tabs, closing tabs, or getting rid of the 'Error # S47452D' Pop-Up and the page that displays it. Due to the way this message impairs the web browser, in some cases users might have to fully terminate their web...

Fast PDF Converter

Posted: February 24, 2017 | Category: Potentially Unwanted Programs (PUPs)
Fast PDF Converter is a potentially unwanted program compatible with Google Chrome and Mozilla Firefox. This software appears to be the product of multiple companies among which are Imali Media and Polarity Technologies Ltd. Both of these companies are known for being linked to various web browser extensions that claim to provide users with quick access to neat features that will enhance their web browsing experience and help them complete various computer tasks such as finding the weather...

Pickles Ransomware

Posted: February 24, 2017 | Category: Ransomware
The Pickles Ransomware is a Trojan that renames and encrypts your files to lock them, after which it tries to sell its victims a password for its decryption application. Since con artists sometimes take their ransoms without providing anything in exchange, malware experts note the usefulness of keeping backups for restoration that this Trojan can't attack. Although this threat is new, numerous brands of anti-malware products have proven themselves capable of detecting and deleting the Pickles...

Unlock26 Ransomware

Posted: February 24, 2017 | Category: Ransomware
The Unlock26 Ransomware is a Trojan that may lock your files by encrypting them and creates Web pop-ups to demand data recovery payments in Bitcoins. Because of the natural liabilities around paying extortionists for reversing their attacks, most victims should attempt other ways of restoring their media, such as loading their most recent backups. Although this threat uses semi-randomized file names, most anti-malware products should detect the Unlock26 Ransomware and be capable of removing...

LokiBot

Posted: February 24, 2017 | Category: Trojans
LokiBot is a spyware program that can collect passwords, logins, and other information from your computer. LokiBot campaigns use spam e-mails for their infection vectors frequently and don't create visually detectable symptoms while they're collecting and transferring data. Let your anti-malware products detect and uninstall LokiBot automatically, and take appropriate precautions afterward for re-securing any vulnerable accounts. LokiBot campaigns, while not the largest in quantity in the...

AZORult

Posted: February 24, 2017 | Category: Trojans
AZORult is a Trojan downloader and spyware combination that can collect information from your computer, as well as enable other attacks by downloading and installing independent threats. Different threat actors are leveraging AZORult in campaigns that are using either spam e-mails or exploit kits for distribution. Let your anti-malware utilities block and remove AZORult automatically and take proper steps for re-securing any data on your computer, such as passwords. While most threats...

Wisperado@india.com Ransomware

Posted: February 24, 2017 | Category: Ransomware
The 'wisperado@india.com' Ransomware is a variant of the Dharma Ransomware, a file-encrypting Trojan that leaves ransoming messages on the victim's PC after locking any files. Since the 'wisperado@india.com' Ransomware's encryption attacks aren't reversible without access to decrypting the data held by its threat actor, you should prevent a hostage situation by keeping backups dated from before the infection. Standard anti-malware products also may detect and delete the 'wisperado@india.com'...

Mute Tabs Button

Posted: February 23, 2017 | Category: Adware
The Mute Tabs Button is a fake browser extension that is only compatible with Google Chrome. According to the official website of the extension, users who install the Mute Tabs Button will gain the ability to mute all of their opened Google Chrome tabs simultaneously or separate tabs. However, the 'Download' button on the website does not appear to work, and the official Web page can't be used to install the Mute Tabs Button. Weirdly enough, the Mute Tabs Button is present on the Google...

PyL33T Ransomware

Posted: February 23, 2017 | Category: Ransomware
The PyL33T Ransomware is a Trojan that can lock your files by enciphering them with an AES algorithm, after which it displays a pop-up notification that delivers its ransom demands. Recovering your data with a decryption application may be impossible, and concerned PC users should continue protecting their media by backing it up to secure locations. Malware experts also strongly recommend updating any anti-malware products, when appropriate, to heighten the chances of detecting and removing...

Yapages.ru

Posted: February 23, 2017 | Category: Browser Hijackers
Yapages.ru is a Russian search engine whose design resembles the one used by Funday24.ru and Smartinf.ru, other Russian search engines that may be hosted on all sorts of domain names. However, the language is not the only common thing between these pages – all of them also are associated with browser hijacking software that may be used to improve their traffic and popularity artificially. The Yapages.ru browser hijacker is not unsafe, and users who opt to install it either knowingly or...

20% of Spam Emails Sent During 2016 Contained Ransomware

Posted: February 22, 2017 | Category: Malware News
Ransomware, as we know it to be one of the most aggressive forms of malware in existence, has been a primary source for hackers and cybercrooks to extort money from computer users. In the recent decade, the time that ransomware has been around, ransomware has evolved to spread through spam emails at attachments primarily. In a recent report released by Kaspersky Lab, it was revealed that at the end of 2016, about 20% of spam messages sent contained some form of ransomware. The methods...

'800-511-8970' Pop-Ups

Posted: February 22, 2017 | Category: Adware
Online technical support tactics are still growing in popularity, and more and more con artists prefer to use this method to take money from random victims that may come across their fraudulent scheme. A recent example of a technical support tactic that malware researchers discovered is associated with the phone number 800-511-8970 which, according to the fraudulent Web browser messages, can get users in touch with certified Microsoft support agents. Apart from promoting fake technical...

Damage Ransomware

Posted: February 22, 2017 | Category: Ransomware
The Damage Ransomware is a Trojan that blocks your local data by encrypting it and asks you to negotiate for any file recovery through e-mail. Paying ransoms that a Trojan's threat actors request for their help may not give you a real decryption service and is inadvisable as anything but a last resort. Preferentially, you should block the Damage Ransomware's installation with anti-malware tools or recover any encoded files through your backups. A Trojan that dates to February of 2017, the...

YouAreFucked Ransomware

Posted: February 22, 2017 | Category: Ransomware
The YouAreFucked Ransomware is a Trojan that locks you out of your PC's local media by encoding it. Most Trojans of this classification also emphasize a ransom-based model for purchasing a file decryptor that may or may not function. For now, malware experts can only recommend that you keep backups to protect your PC's contents and use anti-malware programs to catch and remove the YouAreFucked Ransomware before it attacks. Although threats are a business, the threat actors operating within...

Sage 2.0 Ransomware

Posted: February 22, 2017 | Category: Ransomware
The Sage 2.0 Ransomware is an updated variant of the Sage Ransomware, a Trojan that locks your files behind an encryption cipher to collect ransom payments. Although free data recovery for threats of this type may be impossible, keeping backups on a non-local drive can give you options for restoring any content without paying a con artist. Anti-malware products also can delete the Sage 2.0 Ransomware before it installs itself through its confirmed infection vector of spam e-mails. In late...

TrumpLocker Ransomware

Posted: February 22, 2017 | Category: Ransomware
The TrumpLocker Ransomware is a modified version of VenusLocker, a Trojan that encodes your files so that it can require a Bitcoin ransom in exchange for unlocking them. Its attacks are most remediable directly by using backups that you can restore over any encrypted media and appropriate security protocols to block the threat's installation attempts. No free decryption services for this Trojan exist currently, but various anti-malware products are capable of removing the TrumpLocker...

XYZware Ransomware

Posted: February 21, 2017 | Category: Ransomware
The XYZware Ransomware is a variant of the MafiaWare Ransomware, a member of a group of Trojans that uses the AES encryption to hold your files hostage in exchange for ransom money. Although the con artists in this campaign use payment methods that are not refundable, preserving backups can help you protect your data from any infection-related damages. Malware experts also recommend using anti-malware software for scanning e-mail attachments and other infection vectors to delete the XYZware...

VHDLocker Ransomware

Posted: February 21, 2017 | Category: Ransomware
The VHDLocker Ransomware is a Trojan that uses the Windows BitLocker utility to lock your files, including documents and similar content so that its author can extort money. Since no known means of cracking this encryption method has been verifiable by malware experts, backing up your data to another device and preventing a VHDLocker Ransomware infection are the most dependable protections available to most PC users. The VHDLocker Ransomware is not an affiliate of previously-identified...

Nonereblock Ads

Posted: February 21, 2017 | Category: Adware
Nonereblock Ads are annoying advertisements that may appear in one's browser without any obvious reason. Because of the way these ads are brought to the user's Web browser, they may appear on just about every website that the user visits and the reason for their presence may be unknown unless the user decides to use a credible anti-malware scanner to identify and remove the troublemaker. This may happen because the Nonereblock Ads are associated with 'Nonereblock,' a proxy service that offers...