JackPot Ransomware

Posted: October 28, 2016 | Category: Ransomware
The JackPot Ransomware is a file encryptor Trojan that ransoms your PC's contents by encoding important types of data, such as your text documents. While the JackPot Ransomware loads messaging urging you to pay cryptocurrency fees for the restoration of your content, malware experts continue finding the routine use of backups as being a safer and cheaper way to protect your files. Always allow your anti-malware software the opportunity to remove the JackPot Ransomware and disinfect your PC....

OzoneRAT

Posted: October 27, 2016 | Category: Trojans
OzoneRAT is a Remote Access Trojan (RAT) that can hijack your Web browser to redirect you to a threat website or intercept personal information, as well as providing other means of attacking the PC. Like other RATs, OzoneRAT is designed to maintain system persistence without any visible evidence, although its installation requires your consent (such as by interacting with e-mail attachments) typically. You should treat infections by allowing your anti-malware solutions to remove OzoneRAT...

CommandLine Ransomware

Posted: October 27, 2016 | Category: Ransomware
The CommandLine Ransomware is a Trojan that may encrypt, delete or overwrite files matching its targeted formats, as well as cause other forms of damage to your hard drive. While malware researchers have yet to see the CommandLine Ransomware in deployment against live targets, it includes the essential functions necessary to block data and hold it for ransom, like similar threats. They recommend protecting your data with backups and using anti-malware tools for removing the CommandLine...

Fileice Ransomware

Posted: October 27, 2016 | Category: Ransomware
The FileIce Survey Lockscreen is a Trojan that promotes fake surveys from the fileice.net website for collecting confidential information and distributing threatening software. Although it presents itself as a safe poll promoter often coinciding with attempted, legal downloads, the FileIce Survey Lockscreen, like all threats, is a deliberate threat to your PC's security. Use anti-malware procedures and software as appropriate for disabling its payload and removing the FileIce Survey...

Hucky Ransomware

Posted: October 26, 2016 | Category: Ransomware
The Hucky Ransomware is a Trojan that conducts file-encoding and extortion attacks in an attempted imitation of the '.locky File Extension' Ransomware . Although it's unrelated to that threat, the Hucky Ransomware does show many symptoms in common with it, including using encryption to block your files. PC owners, particularly those of Hungarian residence, should continue protecting their data with backups and anti-malware tools, the latter of which should uninstall the Hucky Ransomware....

'.thor File Extension' Ransomware

Posted: October 26, 2016 | Category: Ransomware
The '.thor File Extension' Ransomware is a Trojan with capabilities focusing on blocking your local content via ciphering techniques and dropping messages soliciting money for its decryption. PC owners should protect their files by keeping backups for restoring as needed, and using anti-malware protection when interacting with a known infection vector, such as e-mail attachments. Even after removing the '.thor File Extension' Ransomware, there are no publicly-available methods of decrypting...

'800-337-7936' Pop-Ups

Posted: October 26, 2016 | Category: Browser Hijackers
The '800-337-7936' pop-ups are technical support hoaxes that instigate contact with con artists pretending to be certified Microsoft technicians. Con artists using the '800-337-7936' pop-ups for his 'business' may ask to have access to your computer, through which they could perform other attacks, or try to collect confidential information or money. Upon signs of this threat's presence, malware experts recommend rebooting into Safe Mode and using anti-malware products to remove the...

AiraCrop Ransomware

Posted: October 26, 2016 | Category: Ransomware
The AiraCrop Ransomware is a Trojan that encrypts your files to hold them hostage while it awaits a ransom payment through a series of websites. Possessing multiple copies of any unique content, especially in locations not vulnerable to being compromised, is an important aspect of defending your PC from both the AiraCrop Ransomware and threats like it. On uninstalling the AiraCrop Ransomware, PC users not interested in preserving samples for the benefit of the security community should let...

VanToMRAT

Posted: October 26, 2016 | Category: Trojans
VanToMRAT is a Remote Access Trojan (RAT) that can proof to be quite threatening, due to its ability to exfiltrate sensitive information from infected computers, as well as to provide the remote attacker with full control over the victim's machine. VanToMRAT allows the threat's operator to access and control important Windows features such as the Command Prompt, Registry Editor, and Task Manager. Furthermore, VanToMRAT has the ability to capture screenshots from the user's desktop, as well as...

'844-568-2974' Pop-Ups

Posted: October 25, 2016 | Category: Browser Hijackers
Web browser pop-ups that accuse users of distributing illegal or pirated content are usually fake, and their sole purpose is to scare potential victims into believing that they have done something wrong and they need to take action to prevent further complications immediately. This is the exact tactic that the '844-568-2974' pop-ups use. These pop-ups are deceptive Web browser messages, which state that the users' Web browser has detected suspicious activity on their behalf and Internet...

'.shit File Extension' Ransomware

Posted: October 25, 2016 | Category: Ransomware
The '.shit File Extension' Ransomware is a minor variant of the '.locky File Extension' Ransomware that includes a separate extension and extortion instructions alongside the standard data-encoding feature. Content encrypted by the '.shit File Extension' Ransomware can't open until after being decrypted again, although backups can render such technical difficulties moot. Preexisting anti-malware solutions can block all of this threat's known infection vectors or delete the '.shit File...

'.perl File Extension' Ransomware

Posted: October 25, 2016 | Category: Ransomware
The '.perl File Extension' Ransomware is a permutation of the Bart Ransomware, a Trojan that locks your data in password-protected ZIP files and asks for a ransom for restoring them. Because paying ransoms to con artists for data recovery is unreliable naturally, and this family has already proven decryption methods open to the public, malware experts suggest that you withhold your money when possible. Standard anti-malware tools also can negate the attack by removing the '.perl File...

Angry Duck Ransomware

Posted: October 24, 2016 | Category: Ransomware
The Angry Duck Ransomware is a Trojan that displays extortion messages for ransoming money from the PC's operator, theoretically, for reversing its encryption attack. Current samples of the Angry Duck Ransomware show questionable encryption capabilities, although malware experts do encourage having backups to make the issue irrelevant to your information security. Anti-malware tools should be allowed to quarantine or remove the Angry Duck Ransomware whether or not you need to decrypt any...

Lock93 Ransomware

Posted: October 23, 2016 | Category: Ransomware
The Lock93 Ransomware is a Trojan that displays data-ransoming messages and enforces them with an encryption-based payload. The Lock93 Ransomware also may lock your desktop or deliver threats against taking standard actions for disinfecting the PC. Like all file encrypting Trojans, having a backup to protect your data and anti-malware protection for removing the Lock93 Ransomware before its execution are the simplest forms of protection available. While many of the samples malware...

Trojan.AngryAngel

Posted: October 22, 2016 | Category: Trojans
Trojan.AngryAngel is a cyber threat that also may be detected as 'Trojan.MadAngel' by some anti-malware software. This threatening application is designed to infect '.EXE' and '.SCR' files found on the victim's computer, and use them to carry out its threatening operations. Apart from infecting files that match this requirement, Trojan.AngryAnge also may modify the Windows Registry by creating an entry whose purpose is to launch the Trojan's corrupted module automatically as soon as Windows...

CrazyForCraft Toolbar

Posted: October 21, 2016 | Category: Potentially Unwanted Programs (PUPs)
The CrazyForCraft Toolbar is a product of Mindspark Interactive Network, a software publisher that is associated with a number Potentially Unwanted Programs (PUPs). The CrazyForCraft Toolbar is advertised on Crazyforcrafts.com as a suitable program that helps users delve into new hobbies. The CrazyForCraft Toolbar may supply Web surfers with ideas, guides, instruction videos, and other relevant content that can be educational. However, the CrazyForCraft Toolbar may not be as appealing as it...

Gotofindit.com

Posted: October 21, 2016 | Category: Browser Hijackers
Gotofindit.com is a search engine that resembles the default page used by the Google search engine strongly. However, apart from the custom Google search field, Gotofindit.com also includes several quick links to popular Web destinations like Twitter, Facebook and Yahoo. Apart from this, there isn't anything peculiar or suspicious about Gotofindit.com's page – it is meant to work as a simple search engine that yields results based on the Google Search API. Initially, nothing about...

Singlepackz.xyz

Posted: October 21, 2016 | Category: Browser Hijackers
Sinclepackz.xyz is a suspicious website that may be used to host an elaborate technical support tactic that bombard visitors with fake information regarding the security of their computers, as well as the condition of their Windows operating systems. Fake pop-ups, bogus virus alerts, and fake technical data are just some of the tricks that the con artists behind Sinclepackz.xyz use to trick users into believing that they are in dire need of professional technical support services. The pages...

Fumm.co

Posted: October 21, 2016 | Category: Browser Hijackers
Fumm.co is a domain name that appears to be inactive if you try to access it directly. However, there is content hosted on some subdirectories linked to this domain, and one of these directories is associated with a fraudulent scheme whose purpose is to trick users into downloading a fake software update that may not even come for free! The page in question displays a security warning that tells potential victims: 'Windows security Notification: Your [ANTIVIRUS SOFTWARE] subscription has...

'Cocoslim98@gmail.com' Ransomware

Posted: October 20, 2016 | Category: Ransomware
The 'Cocoslim98@gmail.com' Ransomware is a Trojan that encrypts files on your PC and inserts an e-mail address into their names. The con artists operating from that address may pose as security technicians or request money in exchange for helping you decrypt your data. If possible, use other methods of restoring any data, in addition to any standard anti-malware tools capable of identifying and removing the 'Cocoslim98@gmail.com' Ransomware from your hard drive. Ransoming strategies vary...