Phantom Ransomware

Posted: August 7, 2020 | Category: Ransomware
The Phantom Ransomware is a file-locking Trojan that has no known connections to Ransomware-as-a-Services or other families. Infected users may find that their media files can't open, see HTA or pop-up ransom notes, or find Trojan-themed extensions on their files' names. Most anti-malware products should delete the Phantom Ransomware appropriately, but they don't negate secure backups for recovering any data. A file-locking Trojan that's borrowing some pseudo-public components for its...

ZES Ransomware

Posted: August 7, 2020 | Category: Ransomware
The ZES Ransomware is a file-locking Trojan from the Makop Ransomware family. It targets Windows systems with a data-encrypting attack that blocks media content like documents, images, or databases. Users with strongly-secured backups have sufficient protection from this feature, and most anti-malware services will remove the ZES Ransomware and other members of its family immediately. Although the Makop Ransomware family has a long way to go for catching up with the sheer sprawl of a...

Trump Ransomware

Posted: August 7, 2020 | Category: Ransomware
The Trump Ransomware is a file-locking Trojan that's part of the Scarab Ransomware family, a Russian Ransomware-as-a-Service. The threat keeps files from opening by encrypting them and holds them hostage until the victim pays its ransom. Users can update and secure their backups for optimal recovery options, and most anti-malware programs should delete the Trump Ransomware if they're active. Colorful themes are one way how threat actors can make their Trojans' campaigns more meaningful or...

Ursnif Trojan

Posted: August 6, 2020 | Category: Trojans
Ursnif Trojan, which may be called by many different names revolving around "Ursnif," is a dangerous malware threat that may be sneaky about its malicious actions. Such actions are random and could easily compromise one's personal information that is either stored on the infected Windows PC or lead to the ability of Ursnif Trojan tracking keystrokes or transmitted data over the Internet. Computer users must understand that Ursnif Trojan is an aggressive form of malware that may not reveal...

Moderned.club

Posted: August 6, 2020 | Category: Browser Hijackers
Moderned.club is a website that is being run by online con artists who engage in fraud to get permission to deliver paid advertisements to your Web browser. However, they do not use adware to get this ability – instead, they use Moderned.club to ask for your permission to enable this page's notifications. Of course, they mask their offer, so that it looks as if you are being prompted to confirm that you are not a robot – a check that many people are used to, and would not think twice before...

Restroyhyt.club

Posted: August 6, 2020 | Category: Browser Hijackers
Restroygyt.club is one of the many websites that host a variation of the 'Please press 'Allow' to continue' Web browser tactic. Thankfully, the con artists running this scheme are not aiming to collect your personal information, money, or financial details – instead, they will be happy to hijack your Web browser notifications. This happens by displaying a fake prompt saying that you need to pass Restroygyt.club's anti-robot check to carry on browsing the Web. However, if you follow the...

Prepairoo.club

Posted: August 6, 2020 | Category: Browser Hijackers
If you ever see Prepairoo.club pop-ups in your Web browser, you should know that they are part of a basic online tactic whose goal is to hijack your Web browser notifications. But why would random con artists want to use your notifications? The answer is simple – they can abuse the feature to deliver unlimited advertisements to you whenever you are browsing the Web. Needless to say, this is an unmissable opportunity for the fraudsters to generate revenue on the backs of people who have fallen...

Plasminori.club

Posted: August 6, 2020 | Category: Browser Hijackers
Plasminori.club is a Web page that uses a sneaky and fake message to acquire your permission to use browser notifications. It shows a prompt saying that you should click 'Allow' to pass a 'human verification' check. However, clicking the button it asks you to, will end up enabling Plasminori.club's notifications. Thankfully, this is not a security concern since this feature cannot be abused by cybercriminals. However, Plasminori.club will use the browser notifications to display tons of...

ConnectionIndexer

Posted: August 6, 2020 | Category: Mac Malware
ConnectionIndexer is a Potentially Unwanted Program (PUP) that Mac users may need to deal with if they are not careful with the files they download from the Internet. This PUP is not a security threat, but it may modify your system and browser settings negatively. One of the changes linked to ConnectionIndexer's installation is having your Web searches redirected to Safe Finder , 0yrvtrh.com or Search.dominantmethod.com.' While this is not a major issue, it may hinder the quality of the...

Deadfiles Ransomware

Posted: August 6, 2020 | Category: Ransomware
The Deadfiles Ransomware is a file-locking Trojan that's from the family of the MedusaLocker Ransomware. The Deadfiles Ransomware can lock media files on the user's computer and later sell an unlocking or decryption service. Users should preserve their backups carefully for recovering and have anti-malware products accessible for removing the Deadfiles Ransomware. T he MedusaLocker Ransomware , a minor family of Trojans that's been ransacking files for a year, is up to a new campaign...

OutCrypt Ransomware

Posted: August 6, 2020 | Category: Ransomware
The OutCrypt Ransomware is a file-locking Trojan without known relatives or a family. It attacks Windows systems by blocking their non-essential media files and may extort money from its victims for an unlocking service. Windows users should let anti-malware tools delete the OutCrypt Ransomware and maintain their backups for painless data recoveries. Standard operating procedures for file-locker Trojans, like spyware or backdoor Trojans, emphasize stealth and running 'below the radar.' A...

ChinaJm Ransomware

Posted: August 6, 2020 | Category: Ransomware
The ChinaJm Ransomware is a file-locking Trojan that's not a part of a Ransomware-as-a-Service, although it borrows some code from older Trojans. The ChinaJm Ransomware attacks Windows environments with a data-encrypting feature that holds files for ransom. Affected users should have backups properly stored for recovering and let their anti-malware products disinfect their systems and remove the ChinaJm Ransomware. Software recycling with the Trojan industry takes place on a small scale...

LOLSnif

Posted: August 6, 2020 | Category: Malware
Usually, two things may happen when a famous malware's source code gets leaked online. It may often turn into a dead project since cybersecurity experts will be able to dissect every line of its code, or it becomes the favorite tool of low-skilled cybercriminals who can rely on the ready-to-use code to craft their variants of the malware. The latter scenario gave birth to LOLSnif, a newly identified malware sample based on the infamous  Ursnif Trojan . The new threat was distributed at the...

'FBI CRIMINAL INVESTIGATION' Pop-Up Scam

Posted: August 5, 2020 | Category: Adware
The 'FBI CRIMINAL INVESTIGATION' pop-up scam is harmless if you do not interact with it. However, if you fall for some of the lies that these corrupted pop-ups contain, you may get involved in a threatening tactic, accidentally, whose end-goal is to collect money, information or payment details from the victim. This tactic is executed with the help of website pop-ups that may show up in your browser when you spend some time browsing shady websites such as the one used to spread pirated...

Life Radio Pro Tab

Posted: August 5, 2020 | Category: Potentially Unwanted Programs (PUPs)
The Life Radio Pro Tab is a browser add-on that may be advertised as a useful tool that can be utilized to listen to online radios for free, directly through your Web browser. While the Life Radio Pro Tab may deliver on its promises, it is important to mention that the administrators of Life Radio Pro Tab do not host any of the radio streaming content. Instead, all they do is to redirect their users to free, 3rd-party streaming services. But why would they prompt you to install their software...

Online Radio Finder Tab

Posted: August 5, 2020 | Category: Potentially Unwanted Programs (PUPs)
The majority of PC security products identify the Online Radio Finder Tab as a Potentially Unwanted Program (PUP) and recommend its removal – it is essential to add that this software is not unsafe, and having it on your machine is not a security concern. However, Online Radio Finder Tab is known to bring undesired changes to its users' Web browsers. Furthermore, it does not offer any distinctive or unique features that would justify using it. The Online Radio Finder Tab is a browser...

Tantsprovisitsc.club

Posted: August 5, 2020 | Category: Browser Hijackers
Browser-based tactics are often very subtle, and you may have no idea that you have fallen for one of them. An example of this type scheme can be found on Tantsprovisitsc.club, a website that pretends to host a casual anti-robot check that must be completed to access more content. However, the instructions that Tantsprovisitsc.club asks you to follow will not take you through any 'human verification' check – instead, they will trick you into modifying your Web browser's settings and allowing...

Limitaterer.club

Posted: August 5, 2020 | Category: Browser Hijackers
Limitaterer.club is a fake website that is being promoted via online advertisements hosted on shady websites. When you see the Limitaterer.club pop-ups in your Web browser, the page may prompt you to click 'Allow' by saying that this is required to complete a 'human verification' check. You should not believe this message, and you should know that the goal of Limitaterer.club is to trick you into subscribing to this website's notifications. Once it gets permission to sue browser...

Nignrecentry.club

Posted: August 5, 2020 | Category: Browser Hijackers
Fake browser pop-ups and alerts are usually used to get users engaged in complicated tactics whose creators aim to collect money or payment information. However, over the past two years, a new tactic of this type has emerged. Instead of money theft, it focuses on hijacking Web browser notifications and then abusing them to deliver paid advertisements. The Nignrecentry.club website hosts a variation of this tactic, and a visit to this page reveals how the fraudulent scheme works. Visitors of...

1dec Ransomware

Posted: August 5, 2020 | Category: Ransomware
The 1dec Ransomware is a file-locking Trojan that's part of a Dharma Ransomware Ransomware-as-a-Service. Family members will block your files, digital media like documents, and extort money for their unlocking service, preferably. Users with secure backups have protection from most of the effects of infections, and good anti-malware programs will proactively remove the 1dec Ransomware. The often-randomly-named Dharma Ransomware family boasts such members as the Devil Ransomware , the...
1 ... 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 ... 1376