FBI Ultimate Game Card Virus

Posted: September 26, 2012 | Category: Ransomware
FBI Ultimate Game Card Virus FBI Ultimate Game Card virus is a ransomware Trojan derived from the same family as the Celas Trojan , the Gema 'Access to your computer was denied' Virus , the SIAE Virus , et al. Other than being retooled to target residents of the United States, the FBI Ultimate Game Card virus is the same as the other members of its family and will block your PC with fraudulent legal authority while FBI Ultimate Game Card claims that you've committed online crimes that call for a financial penalty....

BDS/ZeroAccess.Gen

Posted: September 26, 2012 | Category: Trojans
BDS/ZeroAccess.Gen is a dangerous Trojan horse that is sometimes used by hackers for compromising a computer. Using BDS/ZeroAccess.Gen, a remote hacker may be able to steal data from an infected PC. The infiltration process may take place without any indication to the PC user due to BDS/ZeroAccess.Gen having rootkit capabilities. Sometimes fake alerts and other bogus messages are displayed from BDS/ZeroAccess.Gen.

Trojan.Killav.DR

Posted: September 25, 2012 | Category: Trojans
Trojan.Killav.DR is a Trojan horse that may load on a vulnerable computer without gaining access or permission from the computer user. Upon loaded, Trojan.Killav.DR could allow a remote attacker to gain access or uncover stored data that may be transmitted without an indication to the computer user. In some ways, threats like Trojan.Killav.DR could lead to identity theft where a remote hacker could compromise personal data stored on a system infected with Trojan.Killav.DR. The best...

Worm.Phorpiex.M

Posted: September 25, 2012 | Category: Worms
Worm:Win32/Phorpiex.M uses worm-based functions to distribute itself through both spam e-mail messages and removable drives, with its final payload including the compromise of any infected PC's security for the sake of allowing a remote attacker to gain control. Worm:Win32/Phorpiex.M may install other types of PC threats and will make specific efforts towards dismantling your computer's firewall security features. Since Worm:Win32/Phorpiex.M is both a worm and a backdoor Trojan,...

Australian Federal Police Ukash Virus

Posted: September 25, 2012 | Category: Ransomware
Australian Federal Police Ukash Virus The Australian Federal Police Ukash Virus is a ransomware Trojan that blocks the Windows interface by displaying a fraudulent legal alert and requesting that you pay a fine through Ukash. Although the Australian Federal Police Ukash Virus uses an alert that's tailored to Australian audiences and makes false claims of being sent by the real AFP, SpywareRemove.com malware researchers have noted strong similarities between the Australian Federal Police Ukash Virus and other ransomware Trojans...

Federal Police Ukash Virus

Posted: September 25, 2012 | Category: Ransomware
The Federal Police Ukash Virus is a classification for a family of ransomware Trojans that specialize their pop-up alerts for the country of the PCs that they've infected. By pretending to be affiliated with the Australian Federal Police, Germany's Bundeskriminalamt or other law enforcement agencies, Federal Police Ukash Viruses will persuade their victims to pay a fraudulent fee by any one of various methods (Ukash, MoneyPak, Paysafecard, etc). Not only do SpywareRemove.com malware...

Dirtjumper

Posted: September 25, 2012 | Category: Malware
Dirtjumper, also IDed as RussKill, is a toolkit that's used to design malicious software and is widely-available to any criminal with a spare two hundred dollars. The Trojans that result from a Dirtjumper toolkit tend to be used to create botnet networks of infected PCs that proceed to launch Distributed-Denial-of-Service attacks against specific websites, with most recent attacks targeting banking institutions. SpywareRemove.com malware analysts particularly recommend that employees of banks...

Trojan.Chaspin.A

Posted: September 25, 2012 | Category: Trojans
Trojan.Chaspin.A is a dangerous computer Trojan that is sometimes used by hackers to infiltrate infected systems. Through Trojan.Chaspin.A, data stored on an infected system could be stolen and used later for attacking the user’s online accounts. A system infected with Trojan.Chaspin.A may load the Trojan at startup without any indication to the PC user. Removal of Trojan.Chaspin.A may be accomplished with the use of an antispyware application.

Trojan PWS:MSIL/Petun.A

Posted: September 25, 2012 | Category: Trojans
Trojan PWS:MSIL/Petun.A is a dangerous Trojan horse that may be used to further infect a system with unknown malware threats. Additionally, Trojan PWS:MSIL/Petun.A is able to compromise a system where a remote attacker may gain access. Exectuable files are usually loaded by Trojan PWS:MSIL/Petun.A where they run in the background without detection by the PC user. Removal of Trojan PWS:MSIL/Petun.A can be safely performed with the use of an antimalware program.

WhiteSmoke Toolbar

Posted: September 25, 2012 | Category: Bad Toolbars
WhiteSmoke Toolbar is an untrusted toolbar and translation tool. WhiteSmoke Toolbar is known for being installed without permission from the PC user. Sometimes WhiteSmoke Toolbar is installed without the PC user knowing until they are continually redirected to different types of unwanted and annoying websites. WhiteSmoke Toolbar may hijack a web browser to load random sites, some of which could lead to other malware infections. Uninstallation and removal of WhiteSmoke Toolbar may be...

Win32:FakeAV-ANO

Posted: September 24, 2012 | Category: Trojans
Win32:FakeAV-ANO is a Trojan downloader that's used as one of multiple components for a rogue anti-virus product. Accordingly, Win32:FakeAV-ANO has been found to download other scamware-based PC threats, change your system settings and display fraudulent alerts that promote the purchase of fake security programs. Since SpywareRemove.com malware research team has found that Win32:FakeAV-ANO employs basic obfuscation techniques to avoid detection, they recommend that you use competent...

Startfenster.com

Posted: September 24, 2012 | Category: Browser Hijackers
Startfenster.com Startfenster.com is a news and search website that offers links to content on everything from vodka to nuclear transportation, and SpywareRemove.com malware experts haven't noted any signs of harmful content being promoted by Startfenster.com. Lamentably, some browser hijackers have been seen using Startfenster.com for their preferred startup pages, which can force your browser to load Startfenster.com against your will. These attacks tend to be associated with manual installations of...

Troj/Mdrop-EML

Posted: September 24, 2012 | Category: Trojans
Troj/Mdrop-EML is a backdoor Trojan that compromises your PC's security to allow criminals to control it from a remote server. Along with its Trojan capabilities, SpywareRemove.com malware researchers have also found that Troj/Mdrop-EML possesses worm-based distribution functions that can allow Troj/Mdrop-EML to spread through networks and other sources. However, the predominant Troj/Mdrop-EML infection method is through fake Facebook videos that install Troj/Mdrop-EML as a fraudulent update...

Mirage

Posted: September 24, 2012 | Category: Trojans
Mirage is a backdoor Trojan that's currently utilized for industrial spying efforts in the energy, oil and military sectors. Like other attacks that target industrial/business PCs, Mirage appears to be designed by a competent group of hackers with steady funding and a brisk development cycle, and SpywareRemove.com malware researchers note that Mirage may be undetectable by insufficiently advanced or outdated anti-malware programs. Fortunately, Mirage's propagation uses an easily-identified...

Zero-Day and Flash Flaws in Internet Explorer 10 Patched By Microsoft

Posted: September 22, 2012 | Category: Internet Security
Microsoft has been on the move lately to provide fixes for what could have been one of the biggest zero-day flash flaw vulnerabilities within the latest versions of Internet Explorer. Internet Explorer 10, however, was left out of the exploitation ruckus but has now been recognized for having a similar vulnerability, which Microsoft has now addressed. A previous security flaw within Internet Explorer versions 6, 7,8 and IE9 was on our radar screen from the time that no viable patch was...

Trojan.Taidoor

Posted: September 21, 2012 | Category: Trojans
Trojan.Taidoor is a backdoor Trojan that's seen many variants through the years, with its attacks beginning in 2008 but still very-much-alive in 2012. Although past targets for Trojan.Taidoor attacks included various governments and business sectors, the most recent Trojan.Taidoor-based attacks appear to have shifted their focus to 'think tank' organizations. Infection methods for Trojan.Taidoor attacks have included both social-engineered e-mail messages and web page-based Java exploits....

NSIS:Bundlore-B

Posted: September 21, 2012 | Category: Adware
NSIS:Bundlore-B is an adware program with downloader capabilities that comes in the form of NSIS installer. NSIS:Bundlore-B can install more security threats from a remote server on the affected computer. NSIS:Bundlore-B uses the NSIS installer tools for downloading and executing other malicious files. Mostly, NSIS:Bundlore-B is used to spread browser redirect viruses, unwanted programs and toolbars. NSIS:Bundlore-B is also known to be a media malware infection because it is able to...

TROJ_ARTIEF.LWO

Posted: September 21, 2012 | Category: Trojans
TROJ_ARTIEF.LWO is a malicious file attachment that's distributed in e-mail spamming campaigns. After tricking its victims into launching TROJ_ARTIEF.LWO through typical social engineering cons, TROJ_ARTIEF.LWO will install the backdoor Trojan PlugX. PlugX includes multiple components with a number of features, such as keylogging, screen-capturing and the ability to alter your Registry. While the TROJ_ARTIEF.LWO attack is one of the most obvious methods by which PlugX is distributed, PlugX...

BKDR_PLUGX.SME

Posted: September 21, 2012 | Category: Backdoors
BKDR_PLUGX.SME is a primary component of the PlugX Trojan, a module-based backdoor Trojan that compromises your PC's security with a backdoor vulnerability (along with several spyware-related functions). Typical BKDR_PLUGX.SME infections are the result of opening a malicious Word document that can be detected as TROJ_ARTIEF.LWO . Because e-mail remains the most common method of distributing malicious text files like TROJ_ARTIEF.LWO, SpywareRemove.com malware researchers recommend that you...

BKDR_PLUGX.BUT

Posted: September 21, 2012 | Category: Backdoors
BKDR_PLUGX.BUT is one of the primary components of a PlugX backdoor Trojan, a modular Trojan that includes information-stealing functions along with typical backdoor attacks (such as deleting files, launching programs or changing the Registry). Installation for BKDR_PLUGX.BUT begins with a malicious PDF or DOC file that's distributed via e-mail spam and detected by the name TROJ_ARTIEF.LWO . After TROJ_ARTIEF.LWO is launched, it will install the first PlugX component, BKDR_PLUGX.SME , which...