Interpol Department of Cybercrime Ransomware

Posted: August 14, 2012 | Category: Ransomware
Interpol Department of Cybercrime Ransomware 'Interpol Department of Cybercrime' ransomware is an updated version of ransomware Trojans from the same family as the Metropolitan Police Ukash Virus , ' The Great Britain Police Central e-crime Unit' Ransomware ', the Polícia de Segurança Pública Portuguese Virus , Office Central de Lutte contre la Criminalité Ransomware , the Athens Security Prosecution of Electronic Crime Ransomware and the Cuerpo Nacional de Policia Virus . Despite its minor updates, 'Interpol Department of...

Reveton

Posted: August 14, 2012 | Category: Ransomware
Reveton Reveton is a ransomware Trojan that hijacks your browser to display a fake legal alert while Reveton also locks down your computer. Because Reveton's pop-up alerts often use country-specific references to various legal agencies, Reveton may appear legitimate at first glance, but Reveton simply is a way for criminals to milk money out of PC users by accusing them of random crimes. Standard pop-up alerts from Reveton are recognizable members of the widespread ' Ukash Virus ' family, which...

W32/XDocCrypt.a

Posted: August 14, 2012 | Category: Trojans
W32/XDocCrypt.a is a virus that infects EXE and Microsoft Office files, temporarily encrypting them before W32/XDocCrypt.a conceals them in a semi-random location with the Hidden attribute. Unlike most viruses, W32/XDocCrypt.a doesn't infect new files immediately after you launch a W32/XDocCrypt.a-infected file – instead, W32/XDocCrypt.a's execution triggers the creation of an infector file that launches only after your PC reboots. Files that are damaged by W32/XDocCrypt.a can be restored...

TROJ_RUGENT.A

Posted: August 14, 2012 | Category: Trojans
Games. Although TROJ_RUGENT.A's e-mail messages do include actual DOC files, they also include disguised Trojans (detected as TROJ_DROPPER.WSD ) that install TROJ_RUGENT.A once you open the file attachment. Attacks that SpywareRemove.com malware analysts have observed originating from TROJ_RUGENT.A Trojans include contacting Command & Control servers without permission and transmitting stolen information to said servers, although TROJ_RUGENT.A may also be used for other harmful...

TROJ_DROPPER.WSD

Posted: August 14, 2012 | Category: Trojans
TROJ_DROPPER.WSD is a Trojan that's distributed as a fake Word document-based petition regarding China's treatment of Taiwan in the Olympics. TROJ_DROPPER.WSD's e-mail-distributed files are of minimal consequence if you delete suspicious spam habitually, but if allowed to launch, TROJ_DROPPER.WSD will install the Trojan TROJ_RUGENT.A onto your computer. Because e-mail messages that distribute TROJ_DROPPER.WSD Trojans also display decoy documents and related images during TROJ_DROPPER.WSD's...

iLivid.com

Posted: August 14, 2012 | Category: Browser Hijackers
iLivid.com iLivid.com is a site that promotes a download manager add-on for your web browser. While the iLivid Download Manager may include some beneficial features, this program also incorporates negative characteristics that are typical of PUPs, browser hijackers, adware and even low-level spyware. SpywareRemove.com malware researchers recommend that you pause and consider whether you really want iLivid.com's software before you install anything from the iLivid.com website, and suggest disinfecting...

Trojan Generic_r.BAT

Posted: August 14, 2012 | Category: Trojans
Trojan Generic_r.BAT is a Trojan that spreads via image files that contain a malicious code. Once installed, Trojan Generic_r.BAT downloads potentially malicious files om the infected computer system. Trojan Generic_r.BAT may also damage legitimate files on the targeted PC and, thus, harm your computer. Trojan Generic_r.BAT is detected in various locations of the corrupted machine. Trojan Generic_r.BAT will cause a slow Internet connection and reduce overall PC performance.

Win32/Ponmocup.AA

Posted: August 14, 2012 | Category: Trojans
Win32/Ponmocup.AA is a Trojan which downloads other PC threats onto the affected computer. Win32/Ponmocup.AA collects personal information and computer data associated with the affected operating system. Win32/Ponmocup.AA strives to send collected information to a remote server. Win32/Ponmocup.AA receives data and commands from a remote server or the Internet. Once executed, Win32/Ponmocup.AA creates several potentially malicious files. Win32/Ponmocup.AA may also drop several Registry entries.

Silon

Posted: August 14, 2012 | Category: Malware
Silon is a Trojan, which is created to steal banking data from computer users. If Silon enters the computer system, it can access the PC user's banking credentials. Silon may lead to loss of money and other PC problems. Silon can spread and install itself on the PC via spam mails that carry attractive information, such as lottery prizes, free gifts, messages about packages the computer user should supposedly receive, that could help attackers make PC users click on them, or download malicious...

VirTool:MSIL/Injector.gen!K

Posted: August 14, 2012 | Category: Trojans
VirTool:MSIL/Injector.gen!K is a dangerous Trojan horse that usually displays misleading pop-up alerts. VirTool:MSIL/Injector.gen!K could populate a system with other unknown malware threats upon installation. VirTool:MSIL/Injector.gen!K may also change system settings and limit use of the internet in some cases. A remote hacker could take advantage of VirTool:MSIL/Injector.gen!K and connect to the infected system to steal data. It is important to eliminate the threats that come with...

Trojan.Fadcit.A

Posted: August 14, 2012 | Category: Trojans
Trojan.Fadcit.A is a Trojan that spreads via encrypted downloads and targets Windows PCs. Trojan.Fadcit.A invades the affected computer secretly without a PC user's permission and knowledge. Trojan.Fadcit.A is supported by the rootkit components that allow it to bypass the detection and removal of security applications. Trojan.Fadcit.A can create malicious processes and modify the Windows Registry.Trojan.Fadcit.A can take over system's processes, delete critical elements, block access to...

WikiLeaks Taken Down by Immense DoS (Denial of Service) Attack

Posted: August 13, 2012 | Category: Security News
WikiLeaks, a whistleblower site known for their shrewd and pungent subject matters, remains down under a massive DDoS (Distributed Denial of Service) attack. WikiLeaks has been a news organization figure on the Internet known for posting quite controversial subject matters literally gaining worldwide attention from various sources, including authorities in different corners of the world. The recent string of WikiLeaks attacks comes about just as they start publishing information related to...

TR/Cutwail.jhg

Posted: August 13, 2012 | Category: Trojans
TR/Cutwail.jhg is a Trojan that installs itself on the infected computer system in the location where files of anti-virus software are stored. TR/Cutwail.jhg can come bundled with other Trojan infections such as rootkit type Trojans that hide their selves in the kernel. TR/Cutwail.jhg is hard to find and delete from the affected PC. TR/Cutwail.jhg allows attackers to gain full remote access to the infected computer system. TR/Cutwail.jhg can drop more PC threats.

Claro LTD Toolbar

Posted: August 13, 2012 | Category: Bad Toolbars
Claro LTD Toolbar Claro LTD Toolbar (also known simply as the Claro Toolbar) is a PUP or adware add-on for your browser that's often installed with unrelated applications. Although the Claro LTD Toolbar may offer web accessibility and social networking features that are positive, its resistance to normal uninstall methods, casual changes to your browser settings and habitual attachment to popular sites like Facebook and Youtube may also make Claro LTD Toolbar a nuisance worth removing with a trustworthy...

Isearch.claro-search.com

Posted: August 13, 2012 | Category: Browser Hijackers
Isearch.claro-search.com Isearch.claro-search.com is a search engine website that's promoted by the Claro LTD Toolbar, a PUP and adware program that changes your browser's settings. Although the associated Claro LTD Toolbar is only a minor threat to your PC, Isearch.claro-search.com has been recently reported by some PC security companies as being used to promote fraudulent pharmaceutical websites, and interaction with sites that are displayed by Isearch.claro-search.com should be undergone with caution. Other than...

Heur trojan-dropper.script.generic

Posted: August 13, 2012 | Category: Trojans
Heur Trojan-dropper.script.generic is a general label for a PC threat that's used to install a predetermined payload onto your computer – in most cases, some form of malicious software, such as a banking Trojan, browser hijacker or rootkit. Script-based PC threats like Heur Trojan-dropper.script.generic usually are encountered during unintentional contact with malicious or hacked websites, which can run Heur Trojan-dropper.script.generic and similar scripts without your consent or visible...

Trojan Horse Generic29.AFQ

Posted: August 13, 2012 | Category: Trojans
Trojan Horse Generic29.AFQ is a generic detection for a PC threat that includes characteristics of a Trojan horse, especially in its ability to launch itself without your knowledge and stay active in the form of a concealed background process. SpywareRemove.com malware experts have witnessed recent Trojan Horse Generic29.AFQ attacks concealing themselves in Internet Explorer-related processes, which may be indicative of Trojan Horse Generic29.AFQ being capable of stealing web...

EXP/Java.Ternub.Gen

Posted: August 13, 2012 | Category: Trojans
EXP/Java.Ternub.Gen is a Java-based browser exploit that may be used to install harmful software onto your PC. EXP/Java.Ternub.Gen attacks have been noted to appear on a wide range of fraudulent and otherwise-harmful sites, most of which cater to German web traffic. SpywareRemove.com malware experts note that EXP/Java.Ternub.Gen's attacks are often well-used for distributing high-level PC threats like banking Trojans, although EXP/Java.Ternub.Gen also may be configured for other payloads. As...

Rakshasa

Posted: August 13, 2012 | Category: Malware
In an interesting case of malware being developed 'because we can,' Rakshasa is a rootkit that was designed to infect the BIOS (or Basic Input Output System) of a PC, hence its secondary classification as a 'BIOSkit.' Although Rakshasa was developed solely for research purposes in the capabilities and limitations of malicious software, Rakshasa's creator asserts that PC threats with Rakshasa's capabilities are well within the grasp of actual criminal programmers. Rakshasa doesn't show...

Gauss

Posted: August 10, 2012 | Category: Trojans
Gauss is an advanced form of spyware that, due to structural similarities to such advanced PC threats as Flame and Stuxnet , has been labeled as a probable government-issued saboteur and espionage tool, rather than a common thief of personal bank accounts and other such profitable details. Although no stolen accounts have been reported from Gauss attacks, Gauss nonetheless contains features that allow Gauss to access confidential bank information, particularly for Middle Eastern victims....