‘Windows Genuine Advantage’ Trojan Ransomware

Posted: August 22, 2012 | Category: Ransomware
‘Windows Genuine Advantage’ Trojan Ransomware 'Windows Genuine Advantage' Trojan Ransomware is a clone of the West Yorkshire Ransomware , ' Votre ordinateur est bloqué' Belgium Ransomware and related ransomware Trojans, and uses an updated hoax for German Windows users but, otherwise, the same basic attacks against your PC – including displaying a fake pop-up alert that blocks your ability to use other programs. 'Windows Genuine Advantage' ransomware may also take additional measures to encrypt media files and make them unusable. While...

FakeAlert!bb3

Posted: August 22, 2012 | Category: Malware
FakeAlert!bb3 is a malware infection that may come from a malicious site or malware download. FakeAlert!bb3 may load misleading pop-up messages, which could lead to other malware infections if clicked on. Detection and removal of FakeAlert!bb3 is usually performed with an updated antispyware application.

BrowserModifier.MSConfig.BHO

Posted: August 22, 2012 | Category: Trojans
BrowserModifier.MSConfig.BHO is a dangerous Trojan horse that may install other malware onto an already infected system. BrowserModifier.MSConfig.BHO could modify internet settings and allow remote connections from outside sources. BrowserModifier.MSConfig.BHO puts stored data at risk and may install browser helper objects without any indication to the PC user. Removing BrowserModifier.MSConfig.BHO may be done with an antimalware program.

Crisis

Posted: August 22, 2012 | Category: Rootkits
Crisis is a rootkit that is also known as Morcut and includes broadly-applicable spyware functions – such as keylogging – along with an impressively-varied set of installation tactics. Unlike most rootkits, Crisis is fully functional for both Windows and Mac OS X environments, besides including installation routines for virtual machines and Windows-based mobile platforms. All variants of Crisis should be considered dangerous and highly-invasive to your PC's privacy, since Crisis can install...

Microsoft Security Essentials Alert Virus

Posted: August 21, 2012 | Category: Fake Warning Messages
Microsoft Security Essentials Alert Virus The Microsoft Security Essentials Alert Virus is a ransomware Trojan that imitates the pop-up alerts of Microsoft Security Essentials to encourage you to pay an illegal fine through one of several methods. Because Microsoft Security Essentials Alert Virus may block other programs to prevent you from removing Microsoft Security Essentials Alert Virus and its pop-up, SpywareRemove.com malware analysts recommend disabling Microsoft Security Essentials Alert Virus's startup exploits prior to any...

Trojan.Backdoor.HE

Posted: August 21, 2012 | Category: Trojans
Trojan.Backdoor.HE is a Trojan that's designed to compromise your PC's security after you've been tricked into launching Trojan.Backdoor.HE manually via misleading e-mail spam messages. E-mail messages that carry Trojan.Backdoor.HE as a file attachment use templates to make themselves appear as communications from the UK's Royal Mail service. Naturally, these e-mail messages aren't affiliated with the real Royal Mail, and SpywareRemove.com malware researchers remind UK-based PC users that...

Speebdit.com

Posted: August 21, 2012 | Category: Browser Hijackers
Speebdit.com is a search engine site that claims to be powered by a combination of Google and Bing, in addition to borrowing most of its website layout from the former. While Speebdit.com hasn't been found to be guilty of distributing or promoting PC threats, browser hijackers installed through other methods besides Speebdit.com have been noted to promote Speebdit.com through browser redirects and undesirable settings changes. SpywareRemove.com malware researchers recommend that you treat...

Isearch.babylon.com

Posted: August 21, 2012 | Category: Browser Hijackers
Isearch.babylon.com is a search engine-based sub-domain of Babylon.com, a website that promotes free translation software. While these services might sound harmless, Isearch.babylon.com has been associated with a browser hijacker. Because browser hijackers and other PC threats associated with Isearch.babylon.com are resistant to standard removal methods, you should be prepared to delete Isearch.babylon.com-related PC threats with anti-malware software if you find your browser headed to...

FunDial

Posted: August 21, 2012 | Category: Browser Hijackers
FunDial is a browser hijacker that sets your homepage to its own template, which displays various (mostly blank) thumbnails along with a search bar. FunDial infections are especially associated with malicious browser add-ons or PUPs that use misleading installation methods to gain access to your PC with a bare minimum of your consent – such as by including themselves as accessories with totally unrelated applications. Like other PUPs that hijack your browser to promote unwanted sites and...

Win32:Sirefef-AHF [Trj]

Posted: August 21, 2012 | Category: Trojans
Win32:Sirefef-AHF [Trj] is a computer Trojan that is known for conducting malicious actions without alerting the PC user. Win32:Sirefef-AHF [Trj] may cause a system to crash or perform poorly. Once loaded, Win32:Sirefef-AHF [Trj] may open up a port to allow remote attackers to gain access to the infected PC. Fake alert messages and other pop-ups could be repeated on a system infected with Win32:Sirefef-AHF [Trj]. Removal of Win32:Sirefef-AHF [Trj] is recommended to be performed with an...

PWSteal.Karagany.C

Posted: August 21, 2012 | Category: Trojans
PWSteal.Karagany.C is a rootkit Trojan that can distribute various ransomware threats known as Metropolitan Police Virus, FBI Moneypak, and Cybercrime Investigation Department virus and numerous other PC infections to the affected computer. PWSteal.Karagany.C is difficult to detect and remove by many anti-virus software. PWSteal.Karagany.C is able to affect numerous web browsers by changing Internet settings. PWSteal.Karagany.C exploits various system vulnerabilities and drops more malware...

Virus.Obfuscator.ZJ

Posted: August 21, 2012 | Category: Viruses
Virus.Obfuscator.ZJ, is a virus that is supported by rootkits and infects Windows computers. Virus.Obfuscator.ZJ compromises your computer's and personal security. Virus.Obfuscator.ZJ spreads via security vulnerabilities, and connects to remote servers in an attempt to receive instructions from hackers and perform malicious actions. Virus.Obfuscator.ZJ can download and install other PC threats on the targeted PC which can lead to identity theft and financial losses. Virus.Obfuscator.ZJ tends...

IDP.Trojan

Posted: August 20, 2012 | Category: Trojans
IDP.Trojan is a generic detection for a Trojan that often displays downloader, spyware, browser hijacker or spambot-related characteristics. Because IDP.Trojan can apply to many different variants of PC threats, IDP.Trojan should be identified and removed by anti-malware programs in lieu of attempting to detect, isolate and delete IDP.Trojan yourself. SpywareRemove.com malware researchers have also noted recent occurrences of false positives regarding IDP.Trojan that will label a harmless...

Trojan Horse Generic 27.PN

Posted: August 20, 2012 | Category: Trojans
Trojan Horse Generic 27.PN is a heuristic label for a PC threat that displays Trojan attributes. Recent Trojan Horse Generic 27.PN attacks have focused on the Netherlands and include rootkit components that could be used to compromise your PC's operating system and avert the defenses of security programs. SpywareRemove.com malware researchers note that Trojan Horse Generic 27.PN is unlikely to show symptoms of its presence and usually will come with other types of malicious software, all of...

BDS/Zaccess.W

Posted: August 20, 2012 | Category: Trojans
BDS/Zaccess.W is a dangerous Trojan that is known to open up backdoor access for remote sources. BDS/Zaccess.W may be a gateway for remote attackers to gain access to infected systems. Additionally, BDS/Zaccess.W may run in the background undetected. Removing BDS/Zaccess.W may be performed with an antispyware application.

BackDoor.Hupigon5.CJMY

Posted: August 20, 2012 | Category: Backdoors
BackDoor.Hupigon5.CJMY is a backdoor threat that is known for its ability to open up connectivity to a remove server or hacker. BackDoor.Hupigon5.CJMY may reduce system performance and put stored data at risk of being stolen. It is important to secure an infected system by removing BackDoor.Hupigon5.CJMY with an antispyware application.

Gimemo Trojan

Posted: August 20, 2012 | Category: Trojans
The Gimemo Trojan is a Kaspersky-brand detection for various ransomware Trojans and also can encompass PC threats that are unable to distribute themselves, PC threats that infect new computers through USB drives/networks (such as worms) and even Trojan downloaders. However, the foremost functions for members of the Gimemo Trojan family are to display misleading legal warnings that lock down your PC until you transfer a specified amount of money to the Gimemo Trojan's criminal partners. The...

FinFisher

Posted: August 20, 2012 | Category: Spyware
FinFisher is a spyware program that's marketed to various governments as a form of legal surveillance to prevent computer-related crimes. While FinFisher is ostensibly a benign product that's only used for law enforcement purposes, some copies of FinFisher have been compromised and used to steal valuable information, while other copies of FinFisher have been known to be used in dictatorships and other questionable regimes – most famously, during the rule of Egypt's Hosni Mubarak. iTunes users...

MyAgent

Posted: August 20, 2012 | Category: Trojans
MyAgent MyAgent or Trojan.MyAgent is a backdoor Trojan that's currently used for targeted attacks against companies in the aeronautical, chemical, tech and defense industries. MyAgent is distributed by e-mail hoaxes that include droppers for MyAgent disguised as fake insurance policies and other business documents – in most cases, MyAgent's installer will appear to be a PDF or ZIP file. SpywareRemove.com malware analysts have verified that MyAgent attempts to steal passwords and other types of...

Hackers Use Fake Anti-Hacking Tool 'AntiHacker' to Attack Syrian Activists

Posted: August 17, 2012 | Category: Cybersecurity
It wasn't really that long ago when speculators and conspiracy theorist painted a new type of war, one that would be fought and won or lost in cyberspace. At the time, it sounded like some sci-fi movie madness or intergalactic fantasy, but the reality is battles are being waged in cyberspace on a daily basis, and some are politically motivated. Midst a heated Syrian civil war, local dissidents and activists are being targeted and spied upon by pro-government forces. The surveillance tool of...