Sus/20121889-A

Posted: June 20, 2012 | Category: Trojans
Along with Exp/20121889-A, Sus/20121889-A is a vulnerability that's used to attack your PC from a remote web page. Sus/20121889-A is specially-crafted to attack Internet Explorer and most versions of Windows, and loading a Sus/20121889-A-infected website isn't guaranteed to display obvious symptoms of an attack. Because Sus/20121889-A doesn't have an official security patch for its exploit, SpywareRemove.com malware researchers strongly encourage you to be cautious while web-browsing and use...

Exp/20121889-A

Posted: June 20, 2012 | Category: Trojans
Exp/20121889-A is one detection label for an as-of-yet-unpatched exploit that allows arbitrary script to run on websites that viewed with Internet Explorer. Although this exploit can be used for various attacks, expected consequences focus on drive-by-downloads or drive-by installations that install malicious software on the relevant PC. While Microsoft hasn't yet issued a security patch to close the Exp/20121889-A exploit or its associated exploit Sus/20121889-A , PC security companies have...

Kuluoz

Posted: June 20, 2012 | Category: Trojans
Kuluoz is a family of Trojans that are used to install other PC threats and steal personal information (such as passwords). The majority of Kuluoz variants are designed to install some form of fake security program (such as members of WinWebSec or FakeSysdef ) that display fraudulent security pop-ups and system scans while simultaneously hindering the performance of your PC. Because Kuluoz is often distributed by spam e-mail that alleges to be from the UPS or a similar entity of good...

Hacktool.WindowsLoader

Posted: June 19, 2012 | Category: Trojans
Hacktool.WindowsLoader is a Windows Trojan that allows attackers to gain remote access and control over the infected computer system. Hacktool.WindowsLoader contains keylogging capabilities, can steal personal information such as user names and passwords, and can even use your personal IM and email accounts to launch mass email attacks. Hacktool.WindowsLoader does not have an interface, and all its malicious components function stealthily deep in the system background. Hacktool.WindowsLoader...

Program:Win32/Pameseg.H

Posted: June 19, 2012 | Category: Trojans
Program:Win32/Pameseg.H is a Trojan that tries to steal money from unsuspecting computer users. Program:Win32/Pameseg.H attempts to urge victims to send a text message to a provided number, that would later ask installing a particular software product, which is, of course, paid. Program:Win32/Pameseg.H displays a fake pop-up notification on the affected PC's screen created in French. The malicious software program states that it will install an MSN messenger, Internet Explorer, Adobe Flash...

TrojanDownloader:Win32/Bradop.A

Posted: June 19, 2012 | Category: Trojans
TrojanDownloader:Win32/Bradop.A is the downloader component for a banking Trojan family that, like many others, focuses on stealing account logins from Brazilian banks. TrojanDownloader:Win32/Bradop.A is distributed by fraudulent e-mail messages that include embedded images with shortened links to TrojanDownloader:Win32/Bradop.A; after its launch, TrojanDownloader:Win32/Bradop.A will proceed with installing a second component that's responsible for stealing personal information....

Suspicious.Epi.3

Posted: June 19, 2012 | Category: Trojans
Suspicious.Epi.3 is a a computer Trojan which comes armed with detection technology designed to find new malware infections without traditional signatures. Suspicious.Epi.3 aims at detecting malicious programs that has been intentionally mutated or morphed by cybercriminals. Suspicious.Epi.3 poses a security threat to computer security and should be uninstalled immediately after detection.

Win32/Bradop

Posted: June 19, 2012 | Category: Trojans
Win32/Bradop is a family of banking Trojans that include separate spyware and Trojan downloader components. Like Mal/Behav-130 , Win32/Bancos or TSPY_BANKER.EUIQ , Win32/Bradop appears to predominantly target Brazil-based bank accounts via its distribution through spam e-mail. Unlike some similar PC threats, Win32/Bradop-based Trojans only require you to click on an embedded image, rather than download a file attachment, to be infected. In addition to harvesting Brazilian bank credentials,...

IXESHE

Posted: June 18, 2012 | Category: Malware
IXESHE is a backdoor Trojan that's unusual for its preference for infecting specific targets instead of employing a modern and indiscriminate propagation model; IXESHE's favored victims so far include manufacturers of electronics, German telecommunications companies and countries based in the eastern Asia region. Although IXESHE attempts to conceal its attacks, as a backdoor Trojan, IXESHE allows criminals to use your computer's resources for a variety of crimes, most prominently including...

Trojan.Naid

Posted: June 18, 2012 | Category: Trojans
Naid is a Trojan that uses backdoor attacks to grant third parties access to your PC. Variants of Naid may include slightly different behaviors, such as utilizing Windows services, but Naid always includes attempts to make remote contact with a server that third parties may use to issue instructions or transfer data. Because Naid derives from the work of an organized group with tendencies towards releasing regular updates, malware researchers would advise any PC users concerned about this...

Cissi virus

Posted: June 18, 2012 | Category: Viruses
Contrary to its nickname, the Cissi virus actually is a worm that distributes itself via e-mail spam and includes a backdoor Trojan component. Cissi virus infections are sometimes noticeable by the presence of a Cissi.exe-named memory process and often infect NetBIOS-connected PCs by brute-force hacking weak account passwords. Among its default attacks, Cissi virus will harvest e-mail addresses for future attacks and create a backdoor vulnerability that allows criminals to have a dangerous...

Trojan.Exprez.B

Posted: June 15, 2012 | Category: Trojans
Trojan.Exprez.B is a recent update to Dorifel, a virus that infects executable files, Word documents and Excel spreadsheets. Other than some enhanced self-distribution capabilities, Trojan.Exprez.B doesn't appear to have any extra features that are currently-functional, although SpywareRemove.com malware experts have noted some instances of Trojan.Exprez.B making contact with URLs that could be a precursor to Trojan.Exprez.B being designed to include downloading or backdoor-related features...

Downloader.Instas

Posted: June 15, 2012 | Category: Trojans
Downloader.Instas is a Trojan that drops other malware threats on to the infected computer. Once executed, Downloader.Instas copies itself to the certain location. Downloader.Instas creates the particular registry entry so that it can run automatically every time you start Windows. Downloader.Instas connects to a few locations to drop and run other malware infections on the affected computer that can harm the compromised PC. Downloader.Instas may open a backdoor that will allow remote...

‘FBI Your PC is Blocked’ Ransomware

Posted: June 14, 2012 | Category: Ransomware
‘FBI Your PC is Blocked’ Ransomware 'FBI Your PC is blocked' ransomware is a ransomware Trojan that blocks any attempts to use other applications until a high fine is paid. Although 'FBI Your PC is blocked' ransomware displays a fake crime notification that informs you that this is a legal action, 'FBI Your PC is blocked' ransomware's attacks actually are at least as illegal as the crimes that 'FBI Your PC is blocked' ransomware claims you've been caught committing, and SpywareRemove.com malware experts haven't seen any signs...

Trojan.Dropper.BCMiner

Posted: June 14, 2012 | Category: Trojans
Trojan.Dropper.BCMiner is a Trojan that installs BitCoin minning program on the compromised PC. Bitcoins are virtual currency used for both legitimate purposes and hiding money transactions from the law. Based on the way BitCoin functions, it is possible to get small amount of them by running a particular application on your computer. Cybercriminals run such software programs on numerous affected computers and, thus, gain money. BitCoin minning uses computer resources; therefore,...

Surveyscout.com

Posted: June 14, 2012 | Category: Browser Hijackers
Surveyscout.com is a phishing and spam site that poses as a legitimate company for providing profitable surveys to its members. Although there are completely safe and revenue-generating survey sites online, Surveyscout.com has all the hallmarks of a scam, including asking for personal information, charging an upfront membership fee and sending its members offers with poor prospects for meaningful profit. Surveyscout.com may be promoted in the form of pop-ups from browser hijackers, and...

Searchformore.com

Posted: June 14, 2012 | Category: Browser Hijackers
Searchformore.com is a spam-based search site that generates profit from fraudulent traffic and irrelevant advertisements. By itself, although Searchformore.com is only a minor danger, malware researchers have also found recent instances of search engine hijacks that use Searchformore.com as part of their attack platforms. Redirects to Searchformore.com and similar sites can happen at any time, but are especially probable after you try to use a well-known search engine, and are almost always...

StartNow Toolbar

Posted: June 14, 2012 | Category: Bad Toolbars
StartNow Toolbar is a search engine toolbar that claims to be powered by Bing, although its behavior and the corresponding behavior of its website have given malware researchers ample cause for suspicion of its true intentions. As a potentially unwanted program or PUP, StartNow Toolbar may be installed when you attempt to install an unrelated program that has StartNow Toolbar as an optional inclusion. As long as you pay attention to what you're downloading, StartNow Toolbar shouldn't have a...

Virus.DOS.kurgan.948.a

Posted: June 13, 2012 | Category: Viruses
Virus.DOS.kurgan.948.a is a virus that is able to replicate itself. Virus.DOS.kurgan.948.a may be attached to files on computer system or spread as a malicious script installed into specific part of a computer memory. Virus.DOS.kurgan.948.a is difficult to detect and uninstall from the affected computer. The error to delete Virus.DOS.kurgan.948.a occurs from the disguised copies of the virus saved in the encrypted mode while idle. There's a mechanism to activate and decode them that is...

Rival Gaming

Posted: June 13, 2012 | Category: Bad Toolbars
Rival Gaming is an unwanted browser toolbar that usually inserts itself on the IE, Firefox or other web browser without asking any PC user's permission. For unsuspecting computer user, Rival Gaming is introduced as gaming toolbar, which promises to enable the user navigate between the games at any time. However, Rival Gaming is a potentially unwanted program that comes bundled with other applications from unsafe websites. The Rival Gaming toolbar can cause identity or privacy theft. Rival...