'Final-urgent-trojan-notification-about-window-error-http4004.site' Pop-Ups

Posted: November 11, 2016 | Category: Adware
The Final-urgent-trojan-notification-about-window-error-http4004.site is a corrupted website whose domain name has been carefully chosen to look as if it is associated with a Windows error that may signal that there is something deadly wrong with the visitor's computer. Apart from using a freakishly long and misleading domain name, the Final-urgent-trojan-notification-about-window-error-http4004.site also hosts a large number of pages and pop-ups that have been designed to look as if they are...

Traffic Exchange

Posted: November 11, 2016 | Category: Potentially Unwanted Programs (PUPs)
The Traffic Exchange is a Potentially Unwanted Program (PUP) whose installation might cause undesired side effects to your computer's behavior. The original purpose of the application appears to be to help small-time webmasters to exchange traffic by submitting their website & contact information and then running the Traffic Exchange, which will generate traffic for other registered parties automatically. While this might look like an easy way to boost a page's traffic artificially, you...

'Microsoft.windowssupport0901.online' Pop-Ups

Posted: November 10, 2016 | Category: Adware
Microsoft.windowssupport0901.online is a domain that may be used to host a large number of fake or misleading messages, alerts, and pages that are part of an elaborate online technical support tactic. These hoaxes work by providing random users with fake information regarding their computer's health and performance, and then offering to take care of all the issues as soon as the users opt to subscribe to their services or purchase a software product they promote. The...

'877-786-0114' Pop-Ups

Posted: November 10, 2016 | Category: Adware
The '877-786-0114' pop-ups are fake messages that claim to come from the Microsoft technical support representatives who claim that the user's computer is in need of immediate help. The text that accompanies these pop-ups may often tell users that their 'System Status' is critical, or they need to call 877-786-0114 so that they can receive advice and software recommendations that can keep them safe from the newest and most harmful threats. Often, users may come across these pop-ups while they...

Heimdall Ransomware

Posted: November 10, 2016 | Category: Ransomware
The Heimdall Ransomware is a server-based Trojan that, once run by a threat actor with access, encrypts all of the files on the server. Although the Heimdall Ransomware's development owes itself to being an educational project, its source is available in the wild, raising the possibility of con artists exploiting it in multiple campaigns for extorting ransom money. Backing your server up to locations not accessible by this threat, and having anti-malware tools to detect the Heimdall...

PaySafeGen Ransomware

Posted: November 10, 2016 | Category: Ransomware
The PaySafeGen Ransomware is a Trojan that blocks your files with the AES-256 encryption and delivers ransom demands for providing data recovery if you pay within three days. Current samples of the PaySafeGen Ransomware disguise themselves as generators for prepaid PaySafeCard cards and, accordingly, associate themselves with black market websites and other, illegal software resources strongly. PC users may remove the PaySafeGen Ransomware with any standard anti-malware product, although no...

Telecrypt Ransomware

Posted: November 10, 2016 | Category: Ransomware
The Telecrypt Ransomware is a Trojan that encrypts your files with the support of a Telegram-based C&C infrastructure, and then, loads a module that delivers a graphical ransom message demanding payment. These attacks are most preventable by PC users keeping backups and having anti-malware products able to block the threat's early infection vectors. PC users failing to prevent an infection should remove the Telecrypt Ransomware with a dedicated anti-malware program and employ...

'Orgasm@india.com' Ransomware

Posted: November 9, 2016 | Category: Ransomware
The Globe Ransomware was decrypted by malware researchers in mid-2016 successfully, but for some unknown reason, its authors continue to release new variants that use different extensions and e-mail addresses while preserving the flawed encryption routine that malware experts can decipher. The latest variant of the Globe Ransomware spotted in the wild is the 'Orgasm@india.com' Ransomware, which demands a ransom fee between 1 and 3 Bitcoins, and warns users that it is impossible to recover...

CerberTear Ransomware

Posted: November 9, 2016 | Category: Ransomware
Low-skilled ransomware authors who use open-source ransomware to craft their own crypto-threat variants seem to be getting craftier and the proof for this is a threat called the CerberTear Ransomware. The strange name is a combination of the HiddenTear Ransomware and the Cerber Ransomware , and the reason for it is that the CerberTear Ransomware is based on the HiddenTear projects, but it fully copies the ransom note, file extension, recovery instructions, and other content that the original...

iRansom Ransomware

Posted: November 9, 2016 | Category: Ransomware
The iRansom Ransomware appears to be the creation of people that are fans of the Apple products since they have chosen to adopt the iconic naming pattern that Apple uses for most of its products. However, instead of improving your everyday life, the iRansom Ransomware focuses on making your life miserable by encrypting the files stored on your computer. This particular threat uses a strong encryption algorithm that locks the files with the help of a randomly generated private encryption key,...

Newtab.club

Posted: November 8, 2016 | Category: Browser Hijackers
Newtab.club is a low-quality search engine that may be set as your Web browser's default homepage and new tab page even though you have never heard of it before. This strange thing might happen because of the Newtab.club page relies on browser hijackers to bring users to it, as well as boost the amount of traffic that goes through Newtab.club artificially. This trick is not a new one, and many other low-quality search engines already rely on browser hijackers to improve their popularity, and...

'Your Computer May Be At Risk' Pop-Ups

Posted: November 8, 2016 | Category: Adware
The 'Your Computer May Be At Risk' pop-ups are ill-intended Web browser messages that may provide fake information regarding the computer's health and security. Often, these pop-ups display multiple error codes, worrying threat alerts, and other false information whose sole purpose is to scare users into thinking that their computers are in dire need of professional help. The reason why these pop-ups do this is because they promote fake technical support services that promise to fix all...

FuckSociety Ransomware

Posted: November 8, 2016 | Category: Ransomware
The FuckSociety Ransomware is a new variant of the Fs0ci3ty Ransomware that continues with that Trojan's attacks of encrypting content as a way of extorting money from the PC user. Since the Trojan may cause additional damage to your PC, over time, a prompt counter-response to a confirmed infection is highly recommended by malware experts. Deleting the FuckSociety Ransomware always should use anti-malware programs able to isolate it safely, regardless of whether or not you choose to save your...

Serpent Ransomware

Posted: November 8, 2016 | Category: Ransomware
The Serpent Ransomware is an update of the PayDOS Ransomware that includes additional features related to its ransom transaction and warning message. The Trojan continues misrepresenting the act of renaming file extensions as being equivalent to encrypting them and is vulnerable by the same solutions cited in the PayDOS Ransomware article. Removing the Serpent Ransomware with anti-malware software, rather than personally, can help compensate for the possible presence of other threats or...

zScreenlocker Ransomware

Posted: November 7, 2016 | Category: Ransomware
The zScreenlocker Ransomware is a Trojan that locks your screen by forcing it to display an anti-Islamic image and may include symptoms such as encrypting your files or demanding ransom for restoring your PC. Because the zScreenlocker Ransomware is not a high-level threat, malware experts recommend using traditional anti-malware strategies and assistance from PC security experts or software, as necessary, instead of paying any ransom. An increasing majority of anti-malware products detect and...

Exotic 3.0 Ransomware

Posted: November 7, 2016 | Category: Ransomware
The Exotic 3.0 Ransomware is an updated version of the Exotic Squad Ransomware. Attacks by this threat still include attempts at holding your files hostage via non-consensual encryption, as well as different ways of loading messages asking for money for the safe return of that content. Anti-malware products proven competent at removing the original version of this threat should maintain effectiveness at deleting the Exotic 3.0 Ransomware and, potentially, preventing any damage to your hard...

Hollycrypt Ransomware

Posted: November 7, 2016 | Category: Ransomware
The Hollycrypt Ransomware is a file-encryption Trojan: a threat that encodes your files to block you from using them. Its attacks include generating extortionist messages offering help with decrypting your media, although malware experts always advise taking other recovery options when they're available. If your anti-malware software is updated regularly, it should detect and delete the Hollycrypt Ransomware before any encryption occurs. With programming continuing to be a life skill that...

BTC Ransomware

Posted: November 7, 2016 | Category: Ransomware
The BTC Ransomware, also referred to as the BTCLocker Ransomware or the BTC Virus, is a Trojan that blocks your files by encrypting them, a function that reorganizes their internal data via a cipher. Encryption attacks by the BTC Ransomware include its creation of a ransom message for the supposed purpose of paying to get your data returned, although the transaction comes with no guarantees. Standard safety practices for PC usage, including making backups and having anti-malware products for...

EncryptoJJS Ransomware

Posted: November 7, 2016 | Category: Ransomware
The EncryptoJJS Ransomware is a file-encrypting Trojan that modifies your image-based media with a cipher intended to block you from opening them. Accompanying symptoms of the EncryptoJJS Ransomware's attacks include Bitcoin ransom requests, in the form of Notepad text files, and new extensions modifying the names of all affected content. Instead of leaving your data recovery up to trusting con artists, you can protect your content with standard backup strategies and anti-malware tools for...

Trojan:Win32/Peals.A!cl

Posted: November 7, 2016 | Category: Trojans
Trojan:Win32/Peals.A!cl is a computer Trojan horse that may be loaded from random malicious sources over the Internet. Upon loading, Trojan:Win32/Peals.A!cl may allow remote attackers to gain access to the infected computer where data may be accessed or stolen. Moreover, Trojan:Win32/Peals.A!cl could record your Internet activities and keystrokes made where passwords or banking account access may be obtained by remote hackers. It is extremely important to promptly remove...