Phobos Ransomware

Posted: October 23, 2017 | Category: Ransomware
Phobos is one of the most recent ransomware strains to join the increasingly large database of malware threats. While Phobos appears to be a new threat, much of its code bears some striking similarities to the code that built the infamous Dharma and Crysis Ransomware families not long ago. Although most cybercriminals rely on malicious email links and attachments to distribute the ransomware payload to as many target PCs as possible, there has been a marked shift towards exploiting exposed Remote Desktop Protocols instead. By using readily available scanners, the crooks search for...

WannaCryptor Ransomware (WanaCrypt0r Ransomware)

Posted: March 29, 2017 | Category: Ransomware
WannaCryptor Ransomware (WanaCrypt0r Ransomware) The first major ransomware attack of 2017 involves the use of the WanaCrypt0r Ransomware, an improved version of the '.wcry File Extension' Ransomware which, unfortunately, leverages one of the leaked NSA exploits to exploit vulnerable computers running Windows XP. It is unknown which is the hacking group behind the WanaCrypt0r Ransomware attacks, but one thing is for certain – whoever they are, they certainly know what they are doing. The targets of the WanaCrypt0r Ransomware don't appear to b chosen randomly since most of the infected machines appear to belong to major companies in...

Cerber Ransomware

Posted: March 4, 2016 | Category: Ransomware
The Cerber Ransomware is a file encryptor that takes your data hostage for the sake of selling it back in return for Bitcoin currency. The general unreliability of this means of saving your files causes it to be discouraged as a solution when, instead, a sufficiently sound backup strategy can make the Cerber Ransomware's attacks relatively ineffectual. Due to the danger that the Cerber Ransomware poses to your system, data, and Web browser, malware analysts rate the Cerber Ransomware as a significant threat that should be uninstalled by dedicated anti-malware tools. The Cerber Ransomware...

GandCrab Ransomware

Posted: January 29, 2018 | Category: Ransomware
The GandCrab Ransomware is a severe-level, encryption-based malware threat which has plagued users all over the world throughout 2018. Similar to other notorious Ransomware threats in circulation, GandCrab sneaks into target PCs via exploit kits, malicious Javascript and document email attachments, as well as through a Ransomware-as-a-Service (RaaS) affiliate program, ultimately encrypting the victims' files without their knowledge. The affected users face complete data loss unless they pay the required ransom amount, predominantly in the form of аn obscure virtual currency called DASH....

LockerGoga Ransomware

Posted: March 31, 2019 | Category: Ransomware
LockerGoga Ransomware is a file-locking trojan whose campaigns specialize in sabotaging Windows systems related to the industrial sector and other businesses. In addition to locking files and displaying its ransoming demands, LockerGoga Ransomware has a close relationship with backdoor attacks and may disable the infected machine's network connectivity. Updated anti-malware tools may remove LockerGoga Ransomware, and members of the relevant industries should guard their admin login credentials securely in self-defense. File-locker trojans are most notorious for harming small-scale,...

GozNym

Posted: April 15, 2016 | Category: Trojans | Threat Level: 8/10
GozNym is a spyware program in deployment against prominent financial institutions, such as banks currently. This threat combines code from two previous Trojans while delivering itself through specially-crafted e-mail content. Because malware experts have rated GozNym as a sophisticated, high-level threat with the potential for collecting data, PC users should protect their machines by using dedicated anti-malware tools for deleting GozNym infections, rather than trying to detect this threat by eye. Although threat developers may recycle code from old threats to spawn new ones, in most...

WebDiscover Browser

Posted: July 3, 2015 | Category: Browser Hijackers | Threat Level: 5/10
The WebDiscover Browser is a type of a potentially unwanted program. It can be categorized as a browser hijacker of sorts. WebDiscover is distributed both as an installer download on its official website, as well as through software bundle installers. Software bundles often don't have sufficient disclosure of the features and items they come packed with, which is why potentially unwanted programs often piggy-back in freeware bundles. WebDiscover is a rather obtrusive web search bar that docks a search box on top of your desktop. However, you can neither move, nor close or resize that bar....

GayFreeVideos

Posted: July 24, 2009 | Category: Uncategorized

How to Remove DLL Files

Posted: June 6, 2006 | Category: Tutorials
DLL (Dynamically Link Library) is an executable file that permits programs to share code to perform one or more predefined functions. A DLL file can be used by several programs at the same time. The benefit of having DLL files is that they don't get loaded into random access memory (RAM) along with the main program, which saves up space in RAM. So instead of all the coding being built into the program, it uses a particular DLL file that, with a simple call, can execute the operation for it. Most DLL files are essential for the running of your programs but there are other malicious...

What is CLSID?

Posted: August 10, 2009 | Category: Tutorials
A CLSID is an acronym used to describe a software application's class ID or "class identifier." In other words, a CLSID is a unique identification number given to software applications or software components to function as a kind of 'social security number' for any particular piece of software. CLSIDs form a subcategory of 'Globally Unique Identifiers,' or GUIDs, that are regularly used in COM, and as such, CLSIDs are used to specifically identify COM objects. COM, or "Component Object Model", is a Microsoft architectural model that is applied to component software applications and...

Misleading:Win32/Lodi!MSR

Posted: December 10, 2019 | Category: Misleading Programs | Threat Level: 10/10
Misleading:Win32/Lodi!MSR is a detection name used by the Windows Defender Antivirus. It is important to note that this detection is not associated with a particular piece of software or file and, instead, it is a so-called heuristic-based detection. This technique is being used by every reputable anti-virus product, and it allows anti-virus engines to scan files to look for particular suspicious properties – positive matches are not always a guarantee that a file is harmful, so it is entirely possible that you may see the Misleading:Win32/Lodi!MSR alert being reported for a file downloaded...

Random Music Playing Virus

Posted: October 8, 2013 | Category: Viruses | Threat Level: 8/10
The Random Music Playing Virus is a colloquial phrase identifying browser hijackers and other PC threats that load audio clips under arbitrary conditions – and, it goes without saying, without your consent. While Random Music Playing Viruses were more popular in earlier years prior to the reorganization of the threat industry as a black market business institution, occasionally a Random Music Playing Virus still is seen attacking modern computers. SpywareRemove.com malware researchers only can suggest generalized good Web-browsing habits, along with using anti-malware software as necessary,...

Billy's Apocalypse Ransomware

Posted: August 4, 2020 | Category: Ransomware
Billy's Apocalypse Ransomware is a file-locker that has already managed to infect the computers of dozens of users worldwide. Unfortunately, users who fall victim to this ransomware attack may not be able to recover their files via free decryption software, and their only hope of undoing the damage may be to restore the lost files from an up-to-date backup. Cybersecurity experts have determined that the Billy's Apocalypse Ransomware uses a flawless file-encryption algorithm, which makes the development of a free decryption an impossible task. When the Billy's Apocalypse Ransomware...

Nile Ransomware

Posted: August 3, 2020 | Category: Ransomware
The Nile Ransomware is a file-locking Trojan that's part of the STOP Ransomware family's Ransomware-as-a-Service. The Nile Ransomware disguises itself as a randomly-named temporary file while blocking the user's media files with encryption. A secure backup will assist the recovery of any data significantly, and professional anti-malware tools will block this threat or remove the Nile Ransomware installations. Proving its long-term success in the Black Market by renting itself out to other criminals without any interest in programming, STOP Ransomware is one of the greatest...

CryptoDarkRubix Ransomware

Posted: August 3, 2020 | Category: Ransomware
The CryptoDarkRubix Ransomware is a file-locking Trojan from a possible new family, the Ranet Ransomware. It can block files, such as databases and documents, and further damage them by erasing their internal data. Users should ignore the Trojan's ransom messages, let their anti-malware services uninstall the CryptoDarkRubix Ransomware, and recover from their last backup. The presence of a new campaign from a file-locking Trojan tends to be symptomatic of activity from an overarching family, including Ransomware-as-a-Services like the highly-prolific STOP Ransomware . Although the early...

'Browser started out operating as a RDP having a keylogger' Email Scam

Posted: July 31, 2020 | Category: Ransomware
Online con artists love to use fearmongering strategies to trick potential victims into performing actions that they would not otherwise perform. Such tactics have been around since the Internet became popular, and, unfortunately, it is unlikely that they will go away anytime soon. The 'Browser started out operating as an RDP having a keylogger' email scam is one of the latest tactics to circulate online, and it is being spread via fake email messages. If one of these emailsend up in your inbox, you might get a bit scared at first, because the message contains some very worrisome...

TCPRX Ransomware

Posted: July 31, 2020 | Category: Ransomware
Ransomware threats keep up being one of the biggest dangers you can find online – while many other cyber-threats aim to collect data from you, file-lockers like the newly spotted TCPRX Ransomware have a more sinister purpose. Instead of collecting files, the TCPRX Ransomware will encrypt their contents, therefore preventing you or other victims from accessing important documents, projects, videos, pictures and other files. Of course, this is not how the TCPRX Ransomware's attack ends – usually, the ransomware makes sure to create a ransom note that explains the attack to the victim, and...

Mnbzr Ransomware

Posted: July 30, 2020 | Category: Ransomware
If your files have become inaccessible recently and their names use the 'mnbzr' extension, you should have fallen victim to a new and threatening file-encryption Trojan. The threat, dubbed Mnbzr Ransomware, is meant to encrypt the files on the compromised system, and then create a ransom message, which extorts the victim for money. Unfortunately, the Mnbzr Ransomware can be very devastating since this threat is able to encrypt a wide variety of file types, therefore maximizing the damage it can cause. After a file is locked, the Mnbzr Ransomware will append the extension '.id-<VICTIM...

FlyingShip Ransomware

Posted: July 29, 2020 | Category: Ransomware
Novice cybercriminals often rework public malware projects to craft their own personalized piece of malware. This is the case of the FlyingShip Ransomware exactly, a file-locker that is based on the CryptoWire Ransomware, whose source code was published online in 2017. Fortunately, the file-encryption algorithm that this threat uses is very simple, and it has allowed cybersecurity experts to develop and release a free decryption tool for the CryptoWire Ransomware. The same decryptor also should be compatible with new variants of the threat, such as the FlyingShip Ransomware. While having...

Zbw Ransomware

Posted: July 27, 2020 | Category: Ransomware
The Zbw Ransomware is a file-locking Trojan from the Makop Ransomware family. The Zbw Ransomware can block digital media on your computer, such as documents, as well as destroy backups, change files' names, and leave extortionist text messages. Users with secured backups should recover quickly, and most anti-malware solutions will remove the Zbw Ransomware appropriately. The Trojan family of the Makop Ransomware makes its early history in Turkey, but new versions are, increasingly, attacking users with English as the language of preference. This choice is the same with many modern...

Exorcist Ransomware

Posted: July 24, 2020 | Category: Ransomware
The Exorcist Ransomware is a file-locking Trojan of an unidentified family. The Exorcist Ransomware can lock the user's media and other files through encrypting it and demands a ransom through a hijacked desktop wallpaper and a separate note. Users should recover their work through any secure backups and remove the Exorcist Ransomware through applying a compatible anti-malware solution. File-locking Trojans are a long-streamlined concept of threatening software, with most of their symptoms, attacks, and business habits falling within the stated guidelines of preexisting programs. Into...

Erif Ransomware

Posted: July 24, 2020 | Category: Ransomware
The Erif Ransomware is a file-locking Trojan that can keep documents, images, audio, and other files from opening with its encryption attack. As a component of the famous STOP Ransomware family, it also includes other dangers, such as disabling websites by changing a Windows file's settings. Let your anti-malware programs remove the Erif Ransomware whenever they detect it and save backups on other devices for recovering any non-consensually encrypted media. As the STOP Ransomware remains a steadfast and, presumably, profitable entity in the threat landscape, other...

XCrypto Ransomware

Posted: July 23, 2020 | Category: Ransomware
The XCrypto Ransomware is a file-locking Trojan of an unknown family. Similar to preexisting Ransomware-as-a-Services, it blocks the victim's media content with encryption. The XCrypto Ransomware also delivers a ransom note that asks for money in return for unlocking the files with a decryptor. Users with backups have protection from most ill effects, and professional anti-malware services will detect and remove the XCrypto Ransomware. With the side-by-side campaigns of separate, but symptomatically similar families of Ransomware-as-a-Services, victims have a harder time than ever...

0kilobypt Ransomware

Posted: July 23, 2020 | Category: Ransomware
The 0kilobypt Ransomware is a file-wiping Trojan that pretends that it encrypts files and holds them hostage. Its attacks overwrite the affected data altogether, and users have no benefit from paying any ransoms. Users can recover from secure backups, if they're available, and let anti-malware services safely block or delete the 0kilobypt Ransomware. Threats coming out of Russia's well of programmers can be more unpredictable and, sometimes, destructive, than their counterparts in more streamlined 'business environments' in the threat landscape. The 0kilobypt Ransomware shows the...

AL8G Ransomware

Posted: July 22, 2020 | Category: Ransomware
The AL8G Ransomware is a file-locking Trojan that's a variant on AES-Matrix Ransomware. The AL8G Ransomware can lock files on a computer and keep them from opening by encrypting their data, which usually is irreversible without the attacker's help. Anti-malware programs should protect digital media by blocking this threat before its installation, and if it's necessary may uninstall the AL8G Ransomware. The  AES-Matrix Ransomware  is far from the most abundant Trojan family that uses encryption for making money, but it gets its intended job done. A new version, the AL8G Ransomware,...

RAGA Ransomware

Posted: July 22, 2020 | Category: Ransomware
The RAGA Ransomware is a file-locking Trojan of an unknown family. The RAGA Ransomware can block media throughout a Windows computer and stop it from opening, to force ransoms out of victims. Users can adhere to standardized backup recommendations for neutering the danger of this threat and let their anti-malware services remove the RAGA Ransomware as they see it. With a questionable identity and heritage, the RAGA Ransomware is just making itself known as the newest file-locker Trojan that shows all the symptoms of a Ransomware-as-a-Service and a question mark for its familial nametag....

Opqz Ransomware

Posted: July 21, 2020 | Category: Ransomware
The Opqz Ransomware is a file-locking Trojan that's part of the STOP Ransomware Ransomware-as-a-Service (RaaS). The Opqz Ransomware destroys local backups and encrypts media, such as documents, to hold it for ransom. Preemptive backup security plans can counteract most issues from infections, and an effective anti-malware software will delete the Opqz Ransomware automatically. The prolonged stint of the STOP Ransomware family's abandonment of overt name themes is making itself apparent, again, with its latest member. The Opqz Ransomware is a sample with fairly-recent confirmation as of...
1 2 3 4 5 6 7 8 9 10 11 351