Posted: October 25, 2011 | Category: Trojans | Threat Level: 8/10
TSPY_ZBOT.SMQH is a new version of the spyware and backdoor Trojan Zeus (also known by the name Keylogger Zeus ) that conceals its presence and steals private information such as bank login-related data. Although TSPY_ZBOT.SMQH was only distributed in a temporary string of spam e-mail attacks that targeted Australia-based e-mail addresses, SpywareRemove.com malware analysts have found evidence that TSPY_ZBOT.SMQH could be distributed to other regions in the future. If you've accessed a link from a fake Australian Taxation Office e-mail message, your PC may be infected by TSPY_ZBOT.SMQH,...


Posted: October 25, 2011 | Category: Trojans | Threat Level: 8/10
Mal/ExpJS-N is a malware threat that compromises legitimate websites. The main aim of Mal/ExpJS-N is to redirect victims to an exploit website. Mal/ExpJS-N fingerprints the PC user's browser and browser plug-ins (PDF/Java) and then tries to load relevant exploits in order to corrupt the user's PC with malware infections. You should remove Mal/ExpJS-N immediately after detection.


Posted: October 25, 2011 | Category: Trojans | Threat Level: 8/10
Trojan:Win32/Sirefef.O is a malicious Trojan that is used by numerous rogue anti-spyware programs to enter the targeted computer system. Once installed, Trojan:Win32/Sirefef.O drops malicious files and modifies the registry in an attempt to harm your machine. Trojan:Win32/Sirefef.O may also display fake pop-up ads and warning messages. Trojan:Win32/Sirefef.O can slow down your PC and redirect you to malicious websites.


Posted: October 25, 2011 | Category: Rogue Websites
Screenshot Uncommonsearchsystem.com is one member of an extremely long family tree of fraudulent search engines that wave the CC Search logo as their banner. This family of fake search engine sites uses browser hijackers to redirect web browsers towards Uncommonsearchsystem.com and other CC Search sites. Instead of providing real results, Uncommonsearchsystem.com will offer you exposure to potentially-malicious sites and sites that have no real content other than advertisements. If your web browser has shown symptoms of being attacked by Uncommonsearchsystem.com browser hijackers or similar types...


Posted: October 25, 2011 | Category: Rogue Websites
Screenshot Queryscan.com is a fraudulent website that promotes QueryScan Desktop Search, a seemingly-useful program that offers online search features. However, Queryscan.com's product is incapable of providing useful and unique search results; instead, Queryscan.com's fabled Desktop Search will expose you to advertisements and potentially-hostile websites. Because SpywareRemove.com malware analysts have found that Queryscan.com is also linked to browser-redirecting attacks, you should be aware of the possibility of infection, even if you visit Queryscan.com without installing its product. If your...


Posted: October 25, 2011 | Category: Rogue Websites
Like other forms of fake search engines of poor repute, Qseach.com uses the outer appearance of a web search utility, but fails to provide any of the definitive results that a real search engine would offer to its visitors. Along with this general uselessness, Qseach.com also offers a risk of infecting your PC with browser-redirecting Trojans, which use attacks that are similar to those of a , Google Redirect Virus and, force you to visit Qseach.com, even if that's not your intended destination. Because of all of these malicious traits, SpywareRemove.com malware experts recommend that you...


Posted: October 25, 2011 | Category: Backdoors | Threat Level: 6/10
Backdoor.Java.Racac is a Java bot that is able to use encryption algorithms that include personal and public key use, cipher block chaining, etc. Backdoor.Java.Racac is able to initiate distributed denial-of-service (DDoS) attacks. Backdoor.Java.Racac contains SOCKS proxy capabilities to conceal the true source of its infection. Backdoor.Java.Racac can download and execute an arbitrary code. Backdoor.Java.Racac is also able to detect automated analysis programs and damage itself to avoid its detection.


Posted: October 25, 2011 | Category: Trojans | Threat Level: 8/10
W32/Trojan2.NOXC is a malicious Trojan that is used by hackers in DLL hijacking techniques. W32/Trojan2.NOXC loads a malicious DLL called "deskpan.dll" that corrupts numerous applications. W32/Trojan2.NOXC drops legitimate files together with its malicious DLL from within a directory. W32/Trojan2.NOXC exploits a Windows bug, which enables components to install outside libraries using one specific style. Essentially, DLL files immediately occur as DLL compromising elements, within a directory, and if these files are viewed, malicious DLL files get installed as well. W32/Trojan2.NOXC also...


Posted: October 25, 2011 | Category: Trojans | Threat Level: 8/10
Fareit is a multiple-component family of Trojans that are capable of stealing personal information and using your PC's resources to launch DDoS attacks. Unhappily, Fareit's development is ongoing, and recent analyses have led to the conclusion that Fareit also has been modified to include Bitcoin-mining functions. Such functions are capable of impacting your computer's performance heavily, but, since the inevitable slowdowns that accompany Fareit's Bitcoin-mining attacks also may allow you to detect an otherwise unnoticed Fareit infection, this downside may prove to be a double-edged...

HughesNet Toolbar

Posted: October 25, 2011 | Category: Bad Toolbars | Threat Level: 1/10
The Hughes Toolbar, also referred to as the HughesNet Toolbar, is a Potentially Unwanted Program run by MindSpark LLC, a company responsible for many other PUPs, adware programs and browser hijackers. Most MindSpark products provide poor value to their users, and malware researchers have found the same with the Hughes Toolbar, which may hijack your Web searches under the pretense of providing upgrades to your online search accessibility. Although the Hughes Toolbar is less risky than many other PUPs with similar functions, removing the Hughes Toolbar remains advisable for your browser's...


Posted: October 24, 2011 | Category: Rogue Websites
Storeordersonline.com is used to refer to both a malicious site at the Storeordersonline.com web address and a web browser-redirecting PC threat that redirects you to Storeordersonline.com. Both SpywareRemove.com malware analysts and a number of reputable and independent entities have confirmed that Storeordersonline.com spreads browser-hijacking Trojans to force you to use Storeordersonline.com, even if you're trying to load a completely different site, and these redirect attacks are prone to occurring during attempts to use search engines. Although Storeordersonline.com may try to present...


Posted: October 24, 2011 | Category: Rogue Websites
Whatcarefreefeelslike.com is a malicious website that promotes scamware products and uses advertisements as fake content to funnel affiliate-based revenue back to itself. As is often the case for malicious sites, SpywareRemove.com malware experts have also noted that Whatcarefreefeelslike.com has a habit of using browser-redirecting Trojans to redirect visitors to Whatcarefreefeelslike.com even if they're attempting to visit an unrelated website. Although Whatcarefreefeelslike.com appears to have been shut down by the relevant authorities as of October 24th 2011, Whatcarefreefeelslike.com...


Posted: October 21, 2011 | Category: Backdoors | Threat Level: 6/10
According to SpywareRemove.com security experts, Backdoor.Win32.VB.oyu is a particular nasty backdoor Trojan that functions as a variant of the VOlk botnet. Reports from SpywareRemove.com security experts, conclude that Backdoor.Win32.VB.oyu is being spread and distributed by infected web links on various social networking sites, as well as via malicious spammed out email messages.   Additionally, it is known that Backdoor.Win32.VB.oyu is incredible difficult to find and remove from infected computer systems, thus a good defensive system against these types of malicious attacks is always...


Posted: October 21, 2011 | Category: Trojans | Threat Level: 9/10
Heads up vigilant computer users, as this particular threat's name depicts, a new variant of the Zbot Trojan has been spotted making rounds all across the Web. Win32/Spy.Zbot.ZR is a newer, modified version of the Zbot Trojan – a malicious Trojan-based computer security threat that has been plaguing the cyber world for a while now – that is increasingly becoming known for its privacy invasive behavior. In other words, Win32/Spy.Zbot.ZR poses a definite data security risk, as well as seriously threatens any and all confidential, sensitive information stored on an infected computer...


Posted: October 21, 2011 | Category: Trojans | Threat Level: 9/10
Mal/Behav-103 is a worm and a Trojan horse that exploits infected computers by installing additional types of harmful software, hijacking web browsers and creating instant message-based spam attacks. Although Mal/Behav-103 doesn't possess any unusual capabilities, Mal/Behav-103 should nonetheless be considered an extremely serious threat to the security and privacy of any PC. SpywareRemove.com malware research team has found that recent Mal/Behav-103 attacks have focused on spreading Mal/Behav-103 via fake picture e-mail attachments that portray themselves as images of Libyan dictator...


Posted: October 21, 2011 | Category: Browser Hijackers | Threat Level: 5/10
Screenshot Coolsearchsystem.com is a not-particularly-cool fake search engine site that displays online commerce links and advertisements to drive money to its creators, while falsely-advertising itself as a legitimate search engine. Because this behavior doesn't attract many natural visitors, Coolsearchsystem.com has also resorted to using browser-hijacking Trojans to force a variant of Google Redirect Virus attacks on infected computers. SpywareRemove.com malware experts encourage you to minimize any contact with Coolsearchsystem.com or related websites (including Coolsearchsystem.com's many CC...


Posted: October 21, 2011 | Category: Browser Hijackers | Threat Level: 5/10
Screenshot Its sleek template may give Zwankysearch.com a trustworthy appearance, but, unfortunately, SpywareRemove.com malware researchers have found that Zwankysearch.com's self-proclaimed ability to 'Search the web' is highly-overrated. Unlike the real search engines that Zwankysearch.com imitates, Zwankysearch.com provides fake search results that include advertisements and other methods of driving affiliate-based money right back to Zwankysearch.com. Since Zwankysearch.com can't provide useful search functions, you're not likely to be exposed to Zwankysearch.com, unless you've been infected by...


Posted: October 21, 2011 | Category: Trojans | Threat Level: 9/10
Downloader.Dromedan is a dangerous Trojan that is distributed via malicious email atatachments. Downloader.Dromedan can connect to some malicious websites to download and install additional malware threats on to the infected computer. Once installed on the targeted PC, Downloader.Dromedan drops some system files and modifies the registry. Downloader.Dromedan also creates its registry entry so that it can run each time you start Windows. Downloader.Dromedan injects itself into the svchost.exe process. Remove Downloader.Dromedan immediately after detection.


Posted: October 21, 2011 | Category: Browser Hijackers | Threat Level: 5/10
Screenshot Although the Finderquery.com looks like a safe and trustworthy site, its flagship product, the Finderquery browser plugin, is a mess of adware-related features held together by misleadingly-worded Terms of Service warnings. Finderquery.com claims that Finderquery is a useful plugin to 'turn your Internet Explorer and Firefox address bar into a search bar,' but SpywareRemove.com malware researchers haven't found any real search engine functionality in Finderquery. Instead of providing real search results, Finderquery.com's software provides advertisements and may be a source of exposure...


Posted: October 20, 2011 | Category: Rogue Websites
System-Defence.com is a hostile website that sells scamware products, such as System Defence , and infects visitors with browser-hijacking Trojans that redirect their web browsers back to System-Defence.com. Naturally, SpywareRemove.com malware researchers strongly discourage any contact with System-Defence.com, especially attempts to purchase System Defence, since such an action can allow criminals to abuse your credit card with a series of fraudulent bills. Although System-Defence.com will encourage you through a variety of deceptive means to spend money, including using System Defence...
previous  320  321  322  323  324  325  326  327  328  329  330  331  332  333  334  335  336  337  338  339  340  next     total items: 18138
Home "Articles"