Gitpaste-12 Botnet

Posted: November 10, 2020 | Category: Botnets
The Gitpaste-12 Botnet is a newly identified project that appears to rely heavily on GitHub and Pastebin to achieve its goals. The malware component is compatible with x86 Linux systems, as well as with Linux-based Internet-of-Things (IoT) devices making use of the ARM and MIPS architectures. Cybersecurity experts have identified a dozen exploits that the Gitpaste-12 Botnet leverages to seek out its victims. Some of its common targets are Netlink GPON routers, ASUS routers, Mongo DB...

Ghimob Malware

Posted: November 10, 2020 | Category: Malware
The Ghimob Malware is an Android banking Trojan that redirects victims towards fake login portals for banking services. Besides collecting banking credentials, it also may compromise cryptocurrency wallets such as Bitcoin. Android users, particularly but not exclusively Brazilian ones, should avoid third-party application vendors and remove the Ghimob Malware infections with compatible anti-malware services. The same threat actor responsible for Guildma, or the  Astaroth Trojan , is...

'Google Chrome Blocked For Security Reasons' Pop-Up Scam

Posted: November 9, 2020 | Category: Adware
The 'Google Chrome Blocked For Security Reasons' pop-up scam is a trick that online con artists use to convince random users to download a shady piece of software, which may turn out to be low-quality adware or Potentially Unwanted Program (PUP.) The 'Google Chrome Blocked For Security Reasons' pop-up scam is disguised to look like a legitimate Google Chrome prompt, which tells users that they have seen a 'frequently displayed annoying ad' and that they can disable & remove it by...

Search-fine.com

Posted: November 9, 2020 | Category: Browser Hijackers
Search-fine.com is a low-quality search engine that appears to be working incorrectly at the time of writing this post. Trying to open its homepage leads users to a blank page, so it is impossible to use Search-fine.com's search feature. This should not be an issue considering how many better alternatives to this site users have at their disposal. However, some users might be troubled by this issue because Search-fine.com has been set as their Web browser's default search engine and new tab...

Search-engin-ext.com

Posted: November 9, 2020 | Category: Browser Hijackers
Search-engin-ext.com is a shady page that you may see in your Web browser even though you have never visited it before. This drastic change may happen without your knowledge because Search-engin-ext.com may be promoted with the use of browser hijackers and Potentially Unwanted Programs (PUPs). These software types may sometimes be installed as stand-alone software, or they may be included in software bundles. If your browser's search engine and new tab page seem to redirect you to...

Trikingwes.top

Posted: November 9, 2020 | Category: Browser Hijackers
Trikingwes.top is a deceptive website that hosts a basic tactic whose goal is to gain access to your Web browser notifications. The page tries to achieve this by lying to visitors – it says that users need to click 'Allow' to attest that they are not robots, but the true purpose of this action is to enable Trikingwes.top's notifications. If this change is allowed to happen, Trikingwes.top will exploit your browser notifications to bother you with advertisements regularly. The Trikingwes.top...

Very-important.online

Posted: November 9, 2020 | Category: Browser Hijackers
Very-important.online is a Web page dedicated to hosting a tactic that misleads users by telling them that they are about to download a file they are interested in. However, Very-important.online is not home to any important or valuable files and, instead, it displays a fake promp that is meant to subscribe you to this Web page's notifications. If you approve this change, you will end up seeing tons of Very-important.online notifications every time you go online. The Very-important.online...

Dytotallace.top

Posted: November 9, 2020 | Category: Browser Hijackers
Dytotallace.top is a website that engages users in a basic online tactic meant to trick users into subscribing to this website's notifications. Thankfully, falling for Dytotallace.top's tricks is not unsafe, but it can be a rather annoying issue to experience. If this page is allowed to use notifications, it will make sure to fill your Web browsing sessions with tons of advertisements that appear in the shape of notifications. Dytotallace.top's content is not trustworthy, and you should avoid...

Unesrachin.top

Posted: November 9, 2020 | Category: Browser Hijackers
Unesrachin.top is a deceptive site that does not host any valuable or entertaining content. It may be brought to your Web browser via online advertisements and pop-ups that redirect users to low-quality websites frequently. The goal of Unesrachin.top is to trick you into allowing it to display notifications in your Web browser. The page does this by saying that users must click 'Allow' to confirm they are not robots. Users who do this will, however, end up subscribing to Unesrachin.top's...

Banjo Ransomware

Posted: November 9, 2020 | Category: Ransomware
The Banjo Ransomware is a file-locking Trojan that's a part of the well-known family of the Phobos Ransomware. The Banjo Ransomware uses a secure encryption feature for keeping users from opening documents, images and other media files. Users should have backups for saving their work from these attacks and may use Windows anti-malware programs for containing or removing the Banjo Ransomware. The Greek linguistic-inspired  Phobos Ransomware  family has a minor but ongoing presence in...

Termit Ransomware

Posted: November 9, 2020 | Category: Ransomware
The Termit Ransomware is a file-locking Trojan that's from the DCRTR Ransomware family. Effects of its attacks include non-opening media files, deleted backups, extra extensions on files' names, and text ransom notes. Users should have other backups for restoring their work and let trusted anti-malware products remove the Termit Ransomware from compromised PCs. Another Windows variant of the smaller family of DCRTR Ransomware might be making waves in Norway or merely benefiting from a...

Restoreserver Ransomware

Posted: November 9, 2020 | Category: Ransomware
The Restoreserver Ransomware is a file-locking Trojan that's part of the Scarab Ransomware family, which targets English and Russian-speaking victims. The Restoreserver Ransomware blocks most media files on the PC and overwrites their names and destroys local backups. Backups on secure systems or storage drives, and anti-malware tools for removing the Restoreserver Ransomware, are useful in most infection scenarios. File-locker Trojans from the dual-language family of Scarab Ransomware...

Ngioweb Botnet

Posted: November 9, 2020 | Category: Botnets
The Ngioweb Botnet is a large-scale botnet campaign that has been observed by malware researchers closely since the payloads linked to the campaign were first identified at the beginning of 2019. What is interesting about this botnet is that its payload supports both Linux and Windows operating systems, therefore greatly expanding the target of devices that this malware can target. However, the Linux version of the Ngioweb Botnet appears to have an appetite for Web servers running vulnerable...

Havex RAT

Posted: November 9, 2020 | Category: Remote Administration Tools
Havex is a Remote Access Trojan (RAT) used by the Russian Advanced Persistent Threat (APT) group known as Energetic Bear or Dragonfly. The malware was first spotted in 2013, but it has undergone several significant updates since then. Surprisingly, the Havex RAT continues to be a part of the group's arsenal despite its old age. The goal of the Havex RAT is to grant the attackers control over an infected network and enable them to plant additional malware, spy on operations, manage...

Torisma Spyware

Posted: November 9, 2020 | Category: Spyware
The Torisma Spyware is a threatening implant used by the North Korean hackers known as the Lazarus APT or Hidden Cobra APT. They are one of the most active Advanced Persistent Threat (APT) groups, and their attacks are concentrated on entities in the aerospace, military and defense sectors usually. The Torisma Spyware, in particular, has been used in attacks against targets in the defense and aerospace sectors. The spyware's primary goal is to gather valuable information from the compromised...

Pay2Key Ransomware

Posted: November 9, 2020 | Category: Ransomware
The Pay2Key Ransomware is a file-locking Trojan that blocks the data on companies' networks while generating unique ransom notes for them. Its attacks are using RDP for initial infections and network access, which admins can prevent partially by updating all relevant software and avoiding weak passwords. Businesses without appropriate backups may have no other recovery options, although Windows security solutions may remove the Pay2Key Ransomware in time. The appearance of file-locker...

ELDAOSLA Ransomware

Posted: November 7, 2020 | Category: Ransomware
The ELDAOSLA Ransomware is a file-locking Trojan that's from the Phobos Ransomware family. The ELDAOSLA Ransomware encrypts media files for holding them hostage until the victim pays a ransom, which it demands through pop-ups and text notes. Users with preserved backups can ignore these demands, and Windows anti-malware tools should detect and delete the ELDAOSLA Ransomware. The Phobos Ransomware (or, from Greek, 'fear') family remains adept at popping up at unexpected times and places....

V3JS Ransomware

Posted: November 6, 2020 | Category: Ransomware
The V3JS Ransomware is a file-locking Trojan that holds the user's digital media hostage by encrypting it. Its symptoms include a pop-up alert with English-Polish ransom demands, a timer and a decryption option. Users should reserve backups of their work on other devices for recovering anything that it locks and have a trusted anti-malware product immediately uninstall the V3JS Ransomware from an infected PC. A file-locking Trojan's visuals can be misleading, as in the case of the ...

CC1H Ransomware

Posted: November 6, 2020 | Category: Ransomware
The CC1H Ransomware is a file-locking Trojan from the Globe Imposter Ransomware family. This threat imitates Globe Ransomware's symptoms while conducting actual encryption attacks for blocking the user's files. Proper backup procedures can limit the data losses, and most cyber-security utilities should remove the CC1H Ransomware as a threat. The copycat Trojan family of the  Globe Imposter Ransomware  shows that a Trojan's aesthetic facade and its attack features aren't always...

Pethya Zaplat Zasifrovano Ransomware

Posted: November 6, 2020 | Category: Ransomware
The Pethya Zaplat Zasifrovano Ransomware is a file-locking Trojan that targets Czech speakers. This threat may block files, create pop-up alerts with ransom demands, change the user's wallpaper, and change extensions. Adequate backup precautions will stop any extortion leverage from occurring during infections, and professional PC security services should block and remove the Pethya Zaplat Zasifrovano Ransomware. A possible variant off of the  Xorist Ransomware  is attacking Czech...
1 ... 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 ... 1376