Backdoor.Moudoor

Posted: October 9, 2012 | Category: Backdoors
Backdoor.Moudoor is a Trojan that opens a back door on the compromised PC. Once executed, Backdoor.Moudoor may create several potentially malicious files. Backdoor.Moudoor may also create several registry entries so that it can run automatically every time you start Windows. Backdoor.Moudoor connects to one of the several locations. Backdoor.Moudoor allows attackers to gain remote access and control over the affected computer system. Backdoor.Moudoor may collect the victim's personal...

Cridex Trojan

Posted: October 8, 2012 | Category: Trojans
The Cridex Trojan can refer to any member of the Cridex family, a group of worms that steal account/financial information and use removable devices to distribute themselves to new computers. As SpywareRemove.com malware researchers have observed, Cridex Trojans usually are installed by drive-by-download exploits (such as the Blackhole Exploit Kit), by hacked websites or by other Trojans with explicit downloading functions. Cridex Trojan attacks, despite their invasiveness, don't display...

Livesearchnow.com

Posted: October 8, 2012 | Category: Browser Hijackers
Livesearchnow.com Livesearchnow.com is a search engine that browser hijackers often use as a landing page. Because Livesearchnow.com is designed to mix profitable results into its searches, SpywareRemove.com malware analysts note that Livesearchnow.com may be responsible for linking you to unsafe content and recommend a high level of browser security if you do feel the need to use Livesearchnow.com's search engine. Browser hijackers for Livesearchnow.com and similar sites are often distributed by being...

Trojan.Ransomlock.X

Posted: October 8, 2012 | Category: Trojans
Trojan.Ransomlock.X is a Trojan that locks the desktop of the compromised PC and makes the PC unusable. Trojan.Ransomlock.X locks the targeted machine and displays a fake pop-up warning message, which states to come from law enforcement. The bogus pop-up notification related to Trojan.Ransomlock.X claims that the PC user has been recognized to perform illegitimate activities on their computers. Trojan.Ransomlock.X then asks the affected PC user to pay a so-called fine of 100 Euro through...

Trojan:JS/Medfos.B

Posted: October 8, 2012 | Category: Trojans
Trojan:JS/Medfos.B is a malicious Chrome extension that redirects your searches and exposes you to irrelevant advertisement-based sites. Trojan:JS/Medfos.B is often, but not always, installed by Trojan:Win32/Medfos.B , which malware experts have linked to the presence of Translate This! Toolbars. Although Trojan:JS/Medfos.B's main attacks are designed for Chrome, Trojan:Win32/Medfos.B can be used for a variety of attacks that can affect other types of browsers. Due to the presence of related...

Gen:Trojan.Heur.FU

Posted: October 8, 2012 | Category: Trojans
Gen:Trojan.Heur.FU is a Trojan that downloads a malicious code from a remote server. When successfully downloaded and installed on the vulnerable machine, Gen:Trojan.Heur.FU performs its payload. Gen:Trojan.Heur.FU allows attackers to obtain remote access and control over the affected PC. Gen:Trojan.Heur.FU may propagate via spam email attachments, and usually hides or consists of PDF on its name. Once the recipient opens an attached file, Gen:Trojan.Heur.FU immediately downloads a malicious...

SOPA Ransomware

Posted: October 8, 2012 | Category: Ransomware
SOPA Ransomware SOPA Ransomware is a ransomware Trojan that pretends to be a software representative from the never-implemented Stop Online Piracy Act by blocking your PC with a warning message, encrypting various files and then instructing you to pay a ransom if you want your files back. Due to the legal references used, along with the preferred payment method (MoneyPak), SpywareRemove.com malware experts consider SOPA Ransomware to be targeting the United States explicitly, although other countries –...

Trojan.Downloader.Vundo.J

Posted: October 8, 2012 | Category: Trojans
TrojanDownloader:Win32/Vundo.J is a Trojan downloader that may download and execute arbitrary files on the affected computer. TrojanDownloader:Win32/Vundo.J belongs to the Win32/Vundo family, a multiple-component family of programs that distribute 'out of context' pop-up advertisements. Once installed on the infected computer system, TrojanDownloader:Win32/Vundo.J makes system changes by modifying the Windows Registry and dropping potentially malicious files. TrojanDownloader:Win32/Vundo.J...

Search.gboxapp.com

Posted: October 5, 2012 | Category: Browser Hijackers
Search.gboxapp.com Search.gboxapp.com is a search-based subdomain of a site that promotes an add-on, Gadgetbox Search, which uses attacks typical to PUPs or browser hijackers to force your browser to load Search.gboxapp.com. As is often true for Potentially Unwanted Programs, Search.gboxapp.com's Gadgetbox Search add-on may be distributed through unrelated programs and media files that are distributed via sources like P2P torrents and free download sites. Caution while downloading a popular file may be able to...

DarkAngle

Posted: October 5, 2012 | Category: Trojans
DarkAngle is a Trojan that steals confidential information from your PC. Installation for DarkAngle relies on social engineering techniques – with DarkAngle's icon and file information set to make DarkAngle look like a popular anti-virus program, victims may install DarkAngle thinking they're getting additional anti-malware protection. Due to the deceptive nature of DarkAngle's packaging, SpywareRemove.com malware researchers recommend scanning any installers for anti-virus programs prior to...

Downloader.Parabula

Posted: October 5, 2012 | Category: Downloaders
Downloader.Parabula is a downloader Trojan that downloads other malware threats onto the affected computer. Downloader.Parabula may spread as a PDF or Word icon. Once executed, Downloader.Parabula creates the certain file. Downloader.Parabula runs using the certain command line. Downloader.Parabula strives to download and run potentially malicious files from the remote websites.

Trojan.Apdahost.A

Posted: October 5, 2012 | Category: Trojans
Trojan.Apdahost.A is a dangerous Trojan horse that is known to mislead PC users through fake pop-up alerts. Usually the PC user is not aware that their system is infected with Trojan.Apdahost.A. Most times Trojan.Apdahost.A will run in the background where it could allow remote users to connect and pilfer data stored on the system’s hard drive. Trojan.Apdahost.A is a serious threat and could lead to other system issues if not removed promptly.

Worm.Gnoewin.A

Posted: October 5, 2012 | Category: Worms
Worm:Win32/Gnoewin.A is a worm that distributes itself through removable hard drives, creates backdoor vulnerabilities that allow criminals to compromise your PC and makes negative changes to Internet Explorer's settings. Since Worm:Win32/Gnoewin.A often is installed by Dorkbot worms, SpywareRemove.com malware research team emphasizes the usefulness of scanning your entire PC with anti-malware programs that can remove Worm:Win32/Gnoewin.A along with any additional malware that may be...

Warning: 'Hey, is this your Skype profile pic?' Skype Virus Spreading through 'goo.gl' Links

Posted: October 4, 2012 | Category: Malware News
Internet hackers and cybercrooks are always scheming up the latest attack and are willing to use any means to spread new infections . In their latest attempt, they have used the Skype messaging and communication application to spread a vicious virus through the visually harmless message: "Hey, is this your Skype profile pic?", which includes a 'goo.gl' link redirecting to download a zip file containing the virus. Probably the most discerning aspect of this newly discovered Skype Virus, is...

URL:Mal

Posted: October 4, 2012 | Category: Malware
URL:Mal is a generic alert for web page URLs that include malicious content. Such content often consists of phishing attacks, exploits that download malware onto your PC automatically or socially-engineered attempts to get you to download malware yourself. URL:Mal is most likely to be seen when accidentally visiting malicious sites, but URL:Mal can also be detected on hacked websites or sites that have been altered with content injected by advanced types of malware (banking Trojans and some...

Trojan.Ransomlock.W

Posted: October 4, 2012 | Category: Trojans
Trojan.Ransomlock.W is a Trojan that downloads and installs the Politie Federal Computer Crime Unit Ransomware on the victimized PCs. Trojan.Ransomlock.W locks the desktop of the targeted computer and makes the PC unusable. Trojan.Ransomlock.W demands a supposed ransom from the PC owner to be paid receive an unlock code. While being run, Trojan.Ransomlock.W copies itself to the certain location of the compromised PC. Trojan.Ransomlock.W creates the specific registry entry so that it can...

Trojan.Ransomlock.U

Posted: October 4, 2012 | Category: Trojans
Trojan.Ransomlock.U is a Trojan that is used to spread the Sur votre ordinateur est infecte French Ransomware to the hacked computers. Trojan.Ransomlock.U locks the desktop of the corrupted machine and makes the computer system unusable. Trojan.Ransomlock.U demands a supposed ransom from the affected computer owner to be paid to unlock the computer system. While being activated, Trojan.Ransomlock.U copies itself to the certain location of the infected computer. Trojan.Ransomlock.U creates...

Trojan.Ransomlock.T

Posted: October 4, 2012 | Category: Trojans
Trojan.Ransomlock.T is a Trojan that distributes the Police Service of Nothern Ireland ransomware to the vulnerable computers. Trojan.Ransomlock.T locks the desktop of the affected PC and makes the computer system unusable. Trojan.Ransomlock.T demands the affected computer user to pay the supposed ransom to unlock the computer. When activated, Trojan.Ransomlock.T copies itself to the certain location of the corrupted machine. Trojan.Ransomlock.T creates the specific registry entry so that it...

Trojan.Agent.BRVGen

Posted: October 4, 2012 | Category: Trojans
Trojan.Agent.BRVGen is a Trojan that is connected with a malicious URL, which is blocked because it doesn't conform to website authorization rules. If the malicious domain is not blocked, it downloads and installs malware infections onto the vulnerable computer system before it is banned. Trojan.Agent.BRVGen hides a restoring element in the computer memory. Trojan.Agent.BRVGen can restore its components even though it has been successfully removed from the infected computer system.

TROJ_AGENT.MGSM

Posted: October 4, 2012 | Category: Trojans
TROJ_AGENT.MGSM is an alert for a browser hijacker, MyGeeksmail.dll, which exploits ISAPI filtering to cause browser redirects to unwanted websites. The TROJ_AGENT.MGSM-detected variant of MyGeeksmail.dll includes an Adobe certificate that seemingly confirms its identity as a trustworthy program, although SpywareRemove.com malware researchers note that this is clearly the consequence of an Adobe server breach that allowed criminals to gain limited access to Adobe's certificate information....