Win32.ZAccess.m

Posted: September 4, 2012 | Category: Trojans
Win32.ZAccess.m is an alert for Windows system files that have been infected by ZeroAccess (AKA Sirefef or Max++) rootkits and Trojans. These attacks target specific Windows files and insert code for ZeroAccess to launch automatically as part of your operating system's processes, and SpywareRemove.com malware experts haven't seen any cases of Win32.ZAccess.m or related PC threats infected benign nonsystem files. Win32.ZAccess.m usually is related to launching or protecting other parts of...

Searchamong.com

Posted: September 3, 2012 | Category: Adware
Searchamong.com Searchamong.com is a fake search site that uses a Google-reminiscent interface to make up for its minimal reputation, poor search results and nonexistent marketing on the web. While it would be nice if these were the worst things that Searchamong.com did, Searchamong.com also is guilty of promoting a browser hijacker or PUP (Potentially Unwanted Program) in the form of its SearchAmong Toolbar. This toolbar replaces your browser settings so that you're forced to use Searchamong.com as your...

Startpins.com

Posted: September 3, 2012 | Category: Browser Hijackers
Startpins.com Startpins.com is a website that claims to offer social bookmarking and favorite website/image features. To be fair to Startpins.com, SpywareRemove.com malware researchers haven't seen any signs of Startpins.com going back on its word regarding its site functions, but these mild features are overwhelmed by Startpins.com's drawbacks – as just one more destination for browser hijackers to promote in their browser-altering attacks. Browser hijackers that redirect you to Startpins.com have been...

Search.foxtab.com

Posted: September 3, 2012 | Category: Browser Hijackers
Search.foxtab.com Search.foxtab.com is a Google-powered search engine that's hosted at a subdomain of foxtab.com, a browser plugin site. Unfortunately, while foxtab.com is quick to praise features for its plugin and related Search.foxtab.com search features, SpywareRemove.com malware researchers are forced to be less positive – since Search.foxtab.com-related browser hijacks are a regular occurrence for anyone who installs this company's add-on. These failings have been sufficiently severe for some PC security...

Win32:Hupigon-ONX

Posted: September 3, 2012 | Category: Trojans
Win32:Hupigon-ONX is a Trojan with backdoor capabilities that inserts a malicious code into legitimate files. Win32:Hupigon-ONX's malicious code executes its payload which can differ but causes damage to the targeted PC. Win32:Hupigon-ONX can also download and install other malware threats on the infected computer. Win32:Hupigon-ONX allows attackers to gain remote access and control over the corrupted machine.

Uw computer is vergendeld Ransomware

Posted: September 3, 2012 | Category: Ransomware
Uw computer is vergendeld Ransomware 'Uw computer is vergendeld' Ransomware is a variant of the International Police Association (I.P.A.) Virus that's been localized in countries that speak the Dutch language, such as Belgium and the Netherlands (similar to ' Ihr Computer ist Gesperrt' Ransomware 's localization to Germany). An 'Uw computer is vergendeld' Ransomware infection is easily noticed, given that 'Uw computer is vergendeld' Ransomware's first act consists of displaying a fake police warning while barricading access to...

Ihr Computer ist Gesperrt Ransomware

Posted: September 3, 2012 | Category: Ransomware
Ihr Computer ist Gesperrt Ransomware 'Ihr Computer ist Gesperrt' Ransomware is a German-specific clone of the International Police Association (I.P.A.) Virus, a ransomware that displays inaccurate legal alerts while requesting money before 'Ihr Computer ist Gesperrt' Ransomware allows you to access your computer. However, although the transfer of funds that 'Ihr Computer ist Gesperrt' Ransomware recommends is very real, 'Ihr Computer ist Gesperrt' Ransomware isn't linked to any branch of government and should never be given...

Trojan.Ledap.gen!A

Posted: September 3, 2012 | Category: Trojans
Trojan.Ledap.gen!A is a Trojan that may use system vulnerabilities to access the targeted computer system and then perform numerous illegitimate actions in order to steal financial information or distribute other malware infections. Trojan.Ledap.gen!A can take over virtual memory, generate latect connections to the Internet, gather login credentials and then use them to enter the victim's personal email or online chat accounts for spreading malware threats. Trojan.Ledap.gen!A may disguise...

Trojan.Maljava!gen24

Posted: September 3, 2012 | Category: Trojans
Trojan.Maljava!gen24 is a behavior-based alert for attacks associated with certain types of malicious Java Runtime Environment content, including some zero-day exploits that have not yet been issued a patch by the Oracle company. Trojan.Maljava!gen24 attacks are currently closely-associated with payloads that include backdoor Trojans such as Trojan.Taidoor , although Trojan.Taidoor has also been found to use alternate methods to infect new PCs. Contact with Trojan.Maljava!gen24 can be...

Den Svenska Polisen IT-Sakerhet Ransomware

Posted: September 2, 2012 | Category: Ransomware
Den Svenska Polisen IT-Sakerhet Ransomware Den Svenska Polisen IT-Sakerhet Ransomware is a ransomware Trojan that displays fake police alerts that are localized for Sweden, simultaneously locking down your computer (by blocking other programs) and insisting that you pay a legal fine to remedy the situation. Even though Den Svenska Polisen IT-Sakerhet Ransomware's pop-up warning accuses your PC of being involved in pornography-related crimes, ESG malware researchers haven't found any signs that Den Svenska Polisen IT-Sakerhet...

Cash Edge Pop-Up Virus

Posted: September 2, 2012 | Category: Ransomware
Cash Edge Pop-Up Virus The Cash Edge Pop-up is a symptom of infection by a banking Trojan that attempts to steal personal information for online financial accounts. As expected, the Cash Edge Pop-up preferentially appears after you attempt to access the Cash Edge website, and requests that you enter confidential information as part of a recently-added security protocol. Victims who fall for this ruse will end up handing the information entered over to the Cash Edge Pop-up's corresponding Trojan, which will transmit...

Specialist Crime Directorate Virus

Posted: September 1, 2012 | Category: Ransomware
Specialist Crime Directorate Virus Specialist Crime Directorate Virus is ransomware and a duplicate of Police Central e-crime Unit (PCEU) ransomware . Ransomware like Specialist Crime Directorate Virus uses names of law enforcement agencies to scare PC users into believing they've done something illegal. Specialist Crime Directorate Virus uses a pop-up message with threatening language that states that the PC users has committed several law violations, like visiting websites with child pornography. To make matters worst, the...

Aggressive Botnet Spreads Via Facebook Chat, Skype and other Popular IM Services

Posted: August 31, 2012 | Category: Malware News
Security researchers have overturned an aggressive Botnet threat that is spreading through a multitude of instant messaging services, such as Skype, Facebook Chat, Google Talk, Yahoo Messenger ICQ and Windows Live Messenger. It is nothing new to find where a malware infection utilizes an instant messaging platform to spread. What is new, is the idea of a botnet threat spreading through virtually all popular instant messenger services with the capability to turn vulnerable PCs into zombies...

HackTool:Win32/WpePro

Posted: August 31, 2012 | Category: Trojans
HackTool:Win32/WpePro is a Trojan infection that slows down your PC performance and even harms your computer. HackTool:Win32/WpePro is used as a hacktool for remote attackers to obtain access to the affected computer system, and use it as part of DDoS attacks. HackTool:Win32/WpePro downloads and installs other malware infections on the targeted computer. HackTool:Win32/WpePro may also gather your web browser's history. HackTool:Win32/WpePro can log keystrokes, steal and crack passwords or...

Backdoor.Joanap.A

Posted: August 31, 2012 | Category: Backdoors
Backdoor.Joanap.A is a backdoor Trojan that exploits system vulnerabilities to enable other PC threats to access the targeted computer. Backdoor.Joanap.A invades the compremised PC surreptitiously without a victim's permission and knowledge. Backdoor.Joanap.A is mainly created to open a back door on the corrupted PC. Backdoor.Joanap.A allows attackers to gain remote access and control over the affected computer. Backdoor.Joanap.A invades the targeted computer system, it steals its victim's...

iHaveNet.com

Posted: August 31, 2012 | Category: Browser Hijackers
IhaveNet.com is a general-interest news website that offers articles on such topics as politics, bodily health, sports and the stock market. Even though ESG malware researchers have yet to see any signs of IhaveNet.com promoting malicious content, IhaveNet.com has acquired a minor taint to its reputation from separate browser hijackers that can force your browser to load IhaveNet.com automatically. Browser hijackers that redirect to IhaveNet.com are likely to be installed along with other PC...

Win32/Agent.SFM

Posted: August 31, 2012 | Category: Trojans
Win32/Agent.SFM is a Trojan that gathers information used to access certain websites. Win32/Agent.SFM strives to transfer collected information to a remote server. Once executed, Win32/Agent.SFM downloads malicious files on the infected computer system from a remote server and/or the Internet and runs executable files. Win32/Agent.SFM also creates several Registry entries. Win32/Agent.SFM gathers various information associated with the targeted computer system including anti-virus software...

‘Your computer has been locked!’ Ransomware

Posted: August 31, 2012 | Category: Malware
‘Your computer has been locked!’ Ransomware 'Your computer has been locked!' Ransomware is a recent variant of ' Ukash Virus ' style ransomware Trojans from the Reveton subgroup. In keeping with the scamming philosophy of its relatives, 'Your computer has been locked!' Ransomware presents a pop-up alert that warns you of illegal pornography-related activities linked to your PC as a justification for blocking all programs on your PC. 'Your computer has been locked!' Ransomware claims that it will lift this lockdown once you pay a...

Trojan.Agent/Gen-Banload

Posted: August 30, 2012 | Category: Trojans
Trojan.Agent/Gen-Banload is a generic label for a Trojan downloader from the Banload family – a PC threat that installs advanced forms of spyware (such as banking Trojans). While Banload is one of the most populous and notorious families of Trojan downloaders, Trojan.Agent/Gen-Banload has gained even more infamy than usual due to a recent series of well-crafted spam attacks that distribute Trojan.Agent/Gen-Banload. SpywareRemove.com malware research team has found that these messages claim to...

Troj/JavaBz-IA

Posted: August 30, 2012 | Category: Trojans
Troj/JavaBz-IA is a label for a variant of the Blackhole Exploit Kit (also identified as BEK or Blacole), a configurable package of exploits that use Java and other vulnerable platforms to attack your PC through your browser. Troj/JavaBz-IA and other variants of BEK are often used to install high-level PC threats (such as the sophisticated banking Trojan Zeus , which used landmark Man-in-the-browser attacks to alter some web page content and steal confidential data) and can attack multiple...