Phobos Ransomware

Posted: October 23, 2017 | Category: Ransomware
Phobos is one of the most recent ransomware strains to join the increasingly large database of malware threats. While Phobos appears to be a new threat, much of its code bears some striking similarities to the code that built the infamous Dharma and Crysis Ransomware families not long ago. Although most cybercriminals rely on malicious email links and attachments to distribute the ransomware payload to as many target PCs as possible, there has been a marked shift towards exploiting exposed Remote Desktop Protocols instead. By using readily available scanners, the crooks search for...

WebDiscover Browser

Posted: July 3, 2015 | Category: Browser Hijackers | Threat Level: 5/10
The WebDiscover Browser is a type of a potentially unwanted program. It can be categorized as a browser hijacker of sorts. WebDiscover is distributed both as an installer download on its official website, as well as through software bundle installers. Software bundles often don't have sufficient disclosure of the features and items they come packed with, which is why potentially unwanted programs often piggy-back in freeware bundles. WebDiscover is a rather obtrusive web search bar that docks a search box on top of your desktop. However, you can neither move, nor close or resize that bar....

Cerber Ransomware

Posted: March 4, 2016 | Category: Ransomware
The Cerber Ransomware is a file encryptor that takes your data hostage for the sake of selling it back in return for Bitcoin currency. The general unreliability of this means of saving your files causes it to be discouraged as a solution when, instead, a sufficiently sound backup strategy can make the Cerber Ransomware's attacks relatively ineffectual. Due to the danger that the Cerber Ransomware poses to your system, data, and Web browser, malware analysts rate the Cerber Ransomware as a significant threat that should be uninstalled by dedicated anti-malware tools. The Cerber Ransomware...

GozNym

Posted: April 15, 2016 | Category: Trojans | Threat Level: 8/10
GozNym is a spyware program in deployment against prominent financial institutions, such as banks currently. This threat combines code from two previous Trojans while delivering itself through specially-crafted e-mail content. Because malware experts have rated GozNym as a sophisticated, high-level threat with the potential for collecting data, PC users should protect their machines by using dedicated anti-malware tools for deleting GozNym infections, rather than trying to detect this threat by eye. Although threat developers may recycle code from old threats to spawn new ones, in most...

WannaCryptor Ransomware (WanaCrypt0r Ransomware)

Posted: March 29, 2017 | Category: Ransomware
WannaCryptor Ransomware (WanaCrypt0r Ransomware) The first major ransomware attack of 2017 involves the use of the WanaCrypt0r Ransomware, an improved version of the '.wcry File Extension' Ransomware which, unfortunately, leverages one of the leaked NSA exploits to exploit vulnerable computers running Windows XP. It is unknown which is the hacking group behind the WanaCrypt0r Ransomware attacks, but one thing is for certain – whoever they are, they certainly know what they are doing. The targets of the WanaCrypt0r Ransomware don't appear to b chosen randomly since most of the infected machines appear to belong to major companies in...

GandCrab Ransomware

Posted: January 29, 2018 | Category: Ransomware
The GandCrab Ransomware is a severe-level, encryption-based malware threat which has plagued users all over the world throughout 2018. Similar to other notorious Ransomware threats in circulation, GandCrab sneaks into target PCs via exploit kits, malicious Javascript and document email attachments, as well as through a Ransomware-as-a-Service (RaaS) affiliate program, ultimately encrypting the victims' files without their knowledge. The affected users face complete data loss unless they pay the required ransom amount, predominantly in the form of аn obscure virtual currency called DASH....

LockerGoga Ransomware

Posted: March 31, 2019 | Category: Ransomware
LockerGoga Ransomware is a file-locking trojan whose campaigns specialize in sabotaging Windows systems related to the industrial sector and other businesses. In addition to locking files and displaying its ransoming demands, LockerGoga Ransomware has a close relationship with backdoor attacks and may disable the infected machine's network connectivity. Updated anti-malware tools may remove LockerGoga Ransomware, and members of the relevant industries should guard their admin login credentials securely in self-defense. File-locker trojans are most notorious for harming small-scale,...

GayFreeVideos

Posted: July 24, 2009 | Category: Tracking Cookies
GayFreeVideos is a tracking cookie that may be used by various pornographic or explicit content websites. The access of the GayFreeVideos tracking cookie may take place when visiting porn sits where certain site settings or preferences are stored. The access of the GayFreeVideos cookie could lead to pornographic sites offering other services or lead to other malware downloads through the site, as it is common for porn sites to be a source of malware. Computer users wanting to rid their system of unnecessary or unwanted tracking cookies like GayFreeVideos are recommended to utilize an...

NiceHash Miner

Posted: April 15, 2019 | Category: Malware | Threat Level: 6/10
The NiceHash Miner is a legitimate program used by the NiceHash platform, a marketplace for cryptocurrency mining where clients can either rent out their computers to mine for various cryptocurrency or purchase the mining power of other users. All of this is legitimate and happens with the approval and knowledge of users, but it would appear that groups of cybercriminals might be exploiting the NiceHash Miner tool by creating modified, stealthy versions of it. As you can probably guess, the purpose of the hidden variant of the NiceHash Miner is to work on computers without notifying the...

How to Remove DLL Files

Posted: June 6, 2006 | Category: Tutorials
DLL (Dynamically Link Library) is an executable file that permits programs to share code to perform one or more predefined functions. A DLL file can be used by several programs at the same time. The benefit of having DLL files is that they don't get loaded into random access memory (RAM) along with the main program, which saves up space in RAM. So instead of all the coding being built into the program, it uses a particular DLL file that, with a simple call, can execute the operation for it. Most DLL files are essential for the running of your programs but there are other malicious...

What is CLSID?

Posted: August 10, 2009 | Category: Tutorials
A CLSID is an acronym used to describe a software application's class ID or "class identifier." In other words, a CLSID is a unique identification number given to software applications or software components to function as a kind of 'social security number' for any particular piece of software. CLSIDs form a subcategory of 'Globally Unique Identifiers,' or GUIDs, that are regularly used in COM, and as such, CLSIDs are used to specifically identify COM objects. COM, or "Component Object Model", is a Microsoft architectural model that is applied to component software applications and...

Random Music Playing Virus

Posted: October 8, 2013 | Category: Viruses | Threat Level: 8/10
The Random Music Playing Virus is a colloquial phrase identifying browser hijackers and other PC threats that load audio clips under arbitrary conditions – and, it goes without saying, without your consent. While Random Music Playing Viruses were more popular in earlier years prior to the reorganization of the threat industry as a black market business institution, occasionally a Random Music Playing Virus still is seen attacking modern computers. SpywareRemove.com malware researchers only can suggest generalized good Web-browsing habits, along with using anti-malware software as necessary,...

Cadq Ransomware

Posted: February 22, 2021 | Category: Ransomware
The Cadq Ransomware is a variation of the STOP Ransomware, which was released in February 2021. Unfortunately, although having countless variants, the  STOP Ransomware  is not yet decryptable despite being the most active ransomware family over the past two years. The situation with the Cadq Ransomware is not any different, and its victims will not be able to rely on free decryption options. If the Cadq Ransomware has damaged your files, you are likely to see the '.cadq' extension added to many of your files, as well as the text filesreadme.txt' on your desktop. The latter file contains a...

Happy Ransomware

Posted: February 22, 2021 | Category: Ransomware
The Happy Ransomware file-locker has been around for over a year, and it continues to threaten users to this very day. This threat is meant to encrypt the files it finds on your hard drive, and then drop a message that tells you what you need to do to decrypt your data. Often, ransomware creators extort their victims for money, but Happy Ransomware's creators have a different approach - instead of demanding a ransom payment, they advise the victims to decompile the ransomware and reverse-engineer the encryption algorithm. According to them, recovering files locked by the Happy Ransomware is...

Spare Ransomware

Posted: February 19, 2021 | Category: Ransomware
The Spare Ransomware will not spare any of your files if it manages to infect your computer. This threat is meant to lock you out of your files, and then promise to provide you with a recovery tool, but only if you send a few hundred dollars to the malware's operators. The Spare Ransomware's attack is characterized by several changes to your computer: Encrypted files will be impossible to use. Encrypted files will have their extension changed to '.id-<VICTIM ID>.[de.crypt@aol.com].spare.' The ransom note 'FILES ENCRYPTED.txt' will be dropped on the desktop. The...

Periox Ransomware

Posted: February 19, 2021 | Category: Ransomware
One of the latest file-lockers to be discovered by malware researchers is called the Periox Ransomware and, unfortunately, its victims might have a difficult time restoring access to their files. Just like other file-encryption Trojans, this one also attempts to lock users out of their files by encrypting their contents. The malware goes after regularly used file formats like images, documents, archives, databases and others. Finally, it appends the '.periox' extension to locked files, so that the victim will have an easier time recognizing the damaged files. Victims of the Periox...

VaPo Ransomware

Posted: February 17, 2021 | Category: Ransomware
The VaPo Ransomware is a new file-locker reported by cybersecurity researchers. The goal of this malware is to lock its victims out of their files and then try to convince them to pay a ransom fee. According to VaPo Ransomware's creators, victims who opt to send 0.04 Bitcoin to their wallet will receive a working decryptor that will get their files back in a matter of minutes. However, the criminals offer no proof that they have what it takes to unlock your files – it is likely that victims who pay the ransom fee will end up tricked. The VaPo Ransomware may be distributed online with the...

vGriefferS Ransomware

Posted: February 17, 2021 | Category: Ransomware
The vGriefferS Ransomware is a threatening piece of software designed to damage the files it discovers on infected computers. Of course, its creators do not have the intention to simply destroy your files – they also try to extort you for money by dropping a ransom message, which lists their demands. Just like other ransomware creators, the ones behind this project also promise to provide a working decryption service in exchange for a Bitcoin payment. You can rest assured that trusting ransomware operators is a terrible idea, and you are likely to end up being scammed if you decide to...

Plam Ransomware

Posted: February 16, 2021 | Category: Ransomware
The frequency of the STOP Ransomware attacks has died down over the past year, but this is still one of the most active and dangerous ransomware families online. The latest variant of the  STOP Ransowmare  is called the Plam Ransomware, and, unfortunately, users who fall victim to it will be unable to use a free decryptor to recover their files. The encryption algorithm found in the Plam Ransomware is impossible to crack, and only the ransomware's creators have the key needed to complete the decryption process. The Plam Ransomware may be spread via fake email messages, fake downloads,...

SCR Ransomware

Posted: February 16, 2021 | Category: Ransomware
The SCR Ransomware is a version of the dangerous Matrix Ransomware, a file-locker that has been bothering Internet users for over two years. Unfortunately, this ransomware family uses a flawless file-locking mechanism, and it is impossible to use free decryption software to revert the damage it causes to files. If the SCR Ransomware has damaged your system, then you will see the extension '.SCR' added to many of your files. This is the extension that the SCR Ransomware uses to mark locked files. Of course, the authors of the Matrix Ransomware and the SCR Ransomware do not stop here....

Paralock Ransomware

Posted: February 15, 2021 | Category: Ransomware
File-encryption Trojans are a profitable venture for cybercriminals, especially now that they are so easily accessible. Crooks have dozens of ransomware families to pick from, and they can often use them to create a custom file-locker whose encryption is impossible to reverse for free. The Paralock Ransomware is the latest file-locker to be seen online, and it is based on the infamous  Parasite Ransomware . Unfortunately, users who fall victim to the Paralock Ransomware attack will not have access to a free decryptor, and they may need to explore alternative data recovery options. The...

Hipandahi Ransomware

Posted: February 12, 2021 | Category: Ransomware
The Hipandahi file-locker is a threatening piece of malware whose attack can cause devastating, long-term damage to your important files. The authors of the Hipandahi Ransomware may be spreading it with the use of fraudulent email attachments, pirated downloads, torrents and other shady content. Users who launch the Hipandahi Ransomware on their computers may lose access to many of their important files immediately because the ransomware will encrypt their contents. The full list of file types that the Hipandahi Ransomware targets is very extensive – it goes after documents, media, backups,...

Danielthai Ransomware

Posted: February 11, 2021 | Category: Ransomware
The Danielthai Ransomware is a file-locker that is spread online through corrupted advertisements, fake downloads, torrent trackers, pirated content and other suspicious files. The best way to stay safe from such malware attacks is to use a trustworthy anti-virus software suite, as well as to be careful about the files you download from the Internet. If the Danielthai Ransomware penetrates your computer security, it may cause significant damage to your files by encrypting their contents. Reversing this encryption is not easy at all, and victims of the Danielthai Ransomware will not be...

HelloKitty Ransomware

Posted: February 11, 2021 | Category: Ransomware
The HelloKitty Ransomware is a file-encryption Troja that made the news because it was used in an attack against CD Project Red, a game development company behind popular game titles like Cyberpunk 2077 and Witcher 3. The ransom note that the HelloKitty Ransomware left behind for CD Project Red states that the criminals have encrypted their servers and that they have also collected information regarding their administration, legal, accounting departments, as well as additional game-related content. Just like typical ransomware creators, the ones behind this attack also extort the victim for...

HDLocker Ransomware

Posted: February 11, 2021 | Category: Ransomware
The HDLocker Ransomware is a new file-encryption whose author may originate from China since this is the language used in the ransom note. Unfortunately, the HDLocker Ransomware already has a working file-locking algorithm, and it has the ability to cause a lot of damage if it manages to infect your system successfully. Other parts of the malware appear to be far from finished – the short ransom message lacks critical information such as the contact details of the attacker. In addition to this, researchers who came across the sample encountered numerous bugs and errors while trying to...

Vassago Ransomware

Posted: February 10, 2021 | Category: Ransomware
The Vassago Ransomware is a file-encryption Trojan based on the source code of another very active ransomware family, the  Makop Ransomware . Sadly, this means it uses a flawless file-locking mechanism, which cannot be reversed with the use of free decryption software. The only working decryptor is likely to be in the hands of Vassago Ransomware's creators. But they will not give it to you for free – instead, they ask to be paid a ransom sum via Bitcoin in exchange for their help. The Vassago Ransomware may be spread online via corrupted email attachments, fake downloads, corrupted...

Hackerz Ransomware

Posted: February 10, 2021 | Category: Ransomware
The Hackerz Ransomware is a threatening piece of malware that has been around for over two years. The Hackerz Ransomware is still able to execute a devastating attack against poorly secured Android device, although it is not a very sophisticated project. The ransomware only works on the Android operating system and, surprisingly, its creators do not ask their victim to pay a ransom sum. Instead, they warn them that their files will be deleted after 24 hours, and prompt them to enter a username and password to stop the sequence – however, there is no contact details or instructions on how to...
1 2 3 4 5 6 7 8 9 ... 372