Trojan.Shylock.B

Posted: August 28, 2012 | Category: Trojans
Trojan.Shylock.B is a Trojan that opens a back door on the affected computer and aims at stealing personal information. Trojan.Shylock.B spreads by exploiting the Oracle Java SE Rhino Script Engine Remote Code Execution Vulnerability (CVE-2011-3544) and Oracle Java SE Remote Java Runtime Environment Code Execution Vulnerability (CVE-2012-0507). Once executed, Trojan.Shylock.B creates the certain file. Trojan.Shylock.B then opens a back door and connects to the command-and-control (C&C)...

Runclips.com

Posted: August 28, 2012 | Category: Browser Hijackers
Runclips.com Runclips.com is a fake search engine site that's used to distribute malicious software and expose you to irrelevant links for the profit of Runclips.com's web masters. Because Runclips.com is confirmed as a clone of other types fraudulent search sites that have long histories of using browser-related attacks, SpywareRemove.com malware analysts strongly discourage contact with Runclips.com, sites that resemble Runclips.com or links that are promoted by Runclips.com in its ostensible search...

Dropper.MsPMs

Posted: August 27, 2012 | Category: Trojans
Further proving that even the most up-to-date security is imperfect, Dropper.MsPMs is a Trojan dropper that installs itself onto your computer by using unpatched (as of the time of this writing) Java exploits. Dropper.MsPMs is actively-distributed by at least one malicious website and can be used to install other malware onto your PC, such as worms, banking Trojans or adware. SpywareRemove.com malware experts recommend keeping Java and JavaScript disabled by default to help block...

TROJ_MORCUT.A

Posted: August 27, 2012 | Category: Trojans
TROJ_MORCUT.A is a Trojan that infects Windows computers. TROJ_MORCUT.A injects itself on virtual disks. TROJ_MORCUT.A can distribute more PC threats on the corrupted machine. While being installed, TROJ_MORCUT.A also downloads infected files. JAVA_AGENT.NTW enables attackers to obtain remote access and control over the infected PC. Once executed, TROJ_MORCUT.A performs malicious activities on the affected computer system.

WORM_MORCUT.A

Posted: August 27, 2012 | Category: Worms
WORM_MORCUT.A is a variant of a Crisis or Morcut worm, a self-propagating PC threat with a feature set focused largely on stealing confidential information. The latest WORM_MORCUT.A attacks are indicative of initial infections being achieved through browser-based Java applets that may be loaded on harmful or compromised websites. SpywareRemove.com malware researchers also stress that WORM_MORCUT.A, unlike most PC threats, has noticeable cross-OS compatibility, and is more than capable of...

JAVA_AGENT.NTW

Posted: August 27, 2012 | Category: Mac Malware, Trojans
JAVA_AGENT.NTW is a malicious Java applet that's used to install one of two variants of the Morcut or Crisis worm, depending on the operating system of the PC being attacked. Because Crisis is capable of launching invasive spyware-based attacks that monitor keyboard input and messaging programs like Skype, SpywareRemove.com malware researchers encourage you to consider JAVA_AGENT.NTW's payload a high-level threat to be removed with all due haste by appropriate anti-malware products. As a...

Trojan:Win32/WipMBR.A

Posted: August 27, 2012 | Category: Trojans
Trojan:Win32/WipMBR.A is a Trojan dropper that installs Trojan:Win32/WipMBR.B, a PC threat that causes permanent damage to Windows and prevents your PC from loading. Given the unusually destructive nature of Trojan:Win32/WipMBR.A's payload, a Trojan:Win32/WipMBR.A infection may be hard to miss, but will require you to repair your operating system before you can even begin to delete Trojan:Win32/WipMBR.A or Trojan:Win32/WipMBR.B. Therefore, SpywareRemove.com malware researchers recommend that...

Backdoor.Hikit

Posted: August 27, 2012 | Category: Backdoors
The Hikit rootkit is a high-level threat favored by the Chinese threat group of Axiom for purposes of collecting information from highly-specified targets. With counts of individual attacks by this group at over forty-three thousand, all companies, environmental organizations and other, probable targets should use anti-malware protection to block this threat and remove the Hikit rootkit when required. Along with its semi-unique, advanced defenses, the Hikit rootkit also includes the basic...

Win32:Small-HUF

Posted: August 27, 2012 | Category: Trojans
Win32:Small-HUF is a Trojan that's sometimes associated with e-mail spambot-based attacks – although most recent Win32:Small-HUF issues have been caused by false positives from Avast-brand security software. False positives for Win32:Small-HUF infections are distinguishable by their association with memory dump files and Virtual Machines (VMs), and can be set to be ignored without any damage coming to your PC. Because most versions of PC security software that detect false Win32:Small-HUF...

TrojanSpy:Win64/Ursnif.H

Posted: August 27, 2012 | Category: Trojans
TrojanSpy:Win64/Ursnif.H is a rootkit Trojan that targets PCs with 64-bit Windows operating systems. TrojanSpy:Win64/Ursnif.H is difficult to detect and uninstall by many security tools. TrojanSpy:Win64/Ursnif.H can record a victim's personal information and transmit it to remote attackers. TrojanSpy:Win64/Ursnif.H records mouse clicks, logs keystrokes, and saves screen content of the corrupted machine in order to gather a victim's usernames and passwords. TrojanSpy:Win64/Ursnif.H reduces...

PC Performer

Posted: August 27, 2012 | Category: Potentially Unwanted Programs (PUPs)
PC Performer is a Registry scanner that pretends to clean Windows Registry errors to enhance the stability and speed of your computer. Since PC Performer also creates some noticeable system performance issues along with displaying misleading system information, malware experts recommend deleting PC Performer quickly and with a trusted anti-malware program. Installation methods for PC Performer are known for using bundles that install PC Performer along with unrelated applications, and...

FLV Runner Toolbar

Posted: August 24, 2012 | Category: Bad Toolbars
FLV Runner Toolbar is a modified version of the Google Toolbar that's used to promote sites affiliated with the Conduit company, such as searchconduit.com and flvrunner.ourtoolbar.com. Although FLV Runner Toolbar appears to offer benevolent search-related functions, FLV Runner Toolbar also contains some aspects of a Potentially Unwanted Program by resisting normal removal methods, changing your browser settings without permission and disabling add-ons related to website safety ranking....

Backdoor.Juasek

Posted: August 24, 2012 | Category: Backdoors
Backdoor.Juasek is a backdoor Trojan that allows criminals to exert control over your PC through a C&C server, with potential attacks including disabling security applications, stealing personal information or installing other malware. SpywareRemove.com malware experts have also taken note of Backdoor.Juasek's default tendency to overwrite normal system files with malicious ones, which allows Backdoor.Juasek to launch automatically and may require a restore or repair of Windows. Most...

Searchya! Toolbar

Posted: August 24, 2012 | Category: Bad Toolbars
Searchya! Toolbar Searchya! Toolbar is a search engine toolbar that's used to promote the searchya.com website. Although Searchya! Toolbar and its associated site do possess search features, most PC users have expressed dissatisfaction with the quality of these functions, and malware researchers have found clear indications of Searchya! Toolbar including characteristics of a PUP or browser hijacker. To remove Searchya! Toolbar's unwanted browser changes, you should delete Searchya! Toolbar with a trustworthy...

W32.Changeup

Posted: August 24, 2012 | Category: Worms
W32.Changeup is a dangerous computer worm that may easily spread through mapped drives or networked systems. W32.Changeup usually uses an autorun feature to load during boot of Windows where it continues to run in the background. Other functions of W32.Changeup may cause a system to download unwanted files further infecting a system with malware. Eliminating the threat of W32.Changeup is essential to restore a system back to normal operating conditions.

Game Card Ransomware

Posted: August 23, 2012 | Category: Ransomware
Game Card Ransomware Game Card Ransomware is a dangerous threat notification that is related to the Ukash Virus. Game Card Ransomware usually renders a bogus message while it locks up certain functions of an infected computer. The Game Card Ransomware message itself asks that a fee be paid for supposedly performing illegal copyright actions. Removal of Game Card Ransomware may be performed automatically with an antispyware program.

BDS/ZAccess.V

Posted: August 23, 2012 | Category: Rootkits
BDS/ZAccess.V is a vicious rootkit threat that may be installed without any indication to the computer user. Once installed, BDS/ZAccess.V is apt to performing malicious actions while undetected by security software such as antivirus applications. BDS/ZAccess.V may also allow remote attackers access to the infected system where stored data could be stolen. BDS/ZAccess.V usually blocks downloads or installation of other programs. Removing BDS/ZAccess.V may be accomplished with an antimalware...

Trojan.Mdropper

Posted: August 23, 2012 | Category: Trojans
Trojan.Mdropper is a dangerous Trojan horse parasite that may be associated with the spread of iPhone 5 rumor spam emails. These emails contain a malicious word doc attachment file and could lead to further infections. Trojan.Mdropper could be used by hackers to exploit an adobe flash player CVE-2012-1535 vulnerability. Removal of Trojan.Mdropper may be done through the use of an updated antispyware application.

Trojan:Win64 Alureon gen!k

Posted: August 23, 2012 | Category: Trojans
Trojan:Win64 Alureon gen!k is a dangerous Trojan horse threat. Trojan:Win64 Alureon gen!k is known to target PCs running Windows software in the 64-bit versions. Remote servers may be connected by systems infected with Trojan:Win64 Alureon gen!k allowing hackers to obtain data from that system. At times Trojan:Win64 Alureon gen!k may run while having no indication to the PC user of its existence. The task of removing Trojan:Win64 Alureon gen!k from a system is recommended to be performed by...

Information Security And Control Act 2012 Ransomware

Posted: August 23, 2012 | Category: Ransomware
Information Security And Control Act 2012 Ransomware Ransomware Information Security And Control Act 2012 is a ransomware threat that uses fake messages to extort money. The Ransomware Information Security And Control Act 2012 message usually attempts to relay a notion that the user has somehow performed illegal actions and must pay a fine. Ransomware Information Security And Control Act 2012 could lock up a system and prevent normal usage until it is completely removed. Paying the ransom will not eliminate all issues. Removal of Ransomware...