Phobos Ransomware

Posted: October 23, 2017 | Category: Ransomware
Phobos is one of the most recent ransomware strains to join the increasingly large database of malware threats. While Phobos appears to be a new threat, much of its code bears some striking similarities to the code that built the infamous Dharma and Crysis Ransomware families not long ago. Although most cybercriminals rely on malicious email links and attachments to distribute the ransomware payload to as many target PCs as possible, there has been a marked shift towards exploiting exposed Remote Desktop Protocols instead. By using readily available scanners, the crooks search for...

Cerber Ransomware

Posted: March 4, 2016 | Category: Ransomware
The Cerber Ransomware is a file encryptor that takes your data hostage for the sake of selling it back in return for Bitcoin currency. The general unreliability of this means of saving your files causes it to be discouraged as a solution when, instead, a sufficiently sound backup strategy can make the Cerber Ransomware's attacks relatively ineffectual. Due to the danger that the Cerber Ransomware poses to your system, data, and Web browser, malware analysts rate the Cerber Ransomware as a significant threat that should be uninstalled by dedicated anti-malware tools. The Cerber Ransomware...

GozNym

Posted: April 15, 2016 | Category: Trojans | Threat Level: 8/10
GozNym is a spyware program in deployment against prominent financial institutions, such as banks currently. This threat combines code from two previous Trojans while delivering itself through specially-crafted e-mail content. Because malware experts have rated GozNym as a sophisticated, high-level threat with the potential for collecting data, PC users should protect their machines by using dedicated anti-malware tools for deleting GozNym infections, rather than trying to detect this threat by eye. Although threat developers may recycle code from old threats to spawn new ones, in most...

WebDiscover Browser

Posted: July 3, 2015 | Category: Browser Hijackers | Threat Level: 5/10
The WebDiscover Browser is a type of a potentially unwanted program. It can be categorized as a browser hijacker of sorts. WebDiscover is distributed both as an installer download on its official website, as well as through software bundle installers. Software bundles often don't have sufficient disclosure of the features and items they come packed with, which is why potentially unwanted programs often piggy-back in freeware bundles. WebDiscover is a rather obtrusive web search bar that docks a search box on top of your desktop. However, you can neither move, nor close or resize that bar....

GandCrab Ransomware

Posted: January 29, 2018 | Category: Ransomware
The GandCrab Ransomware is a severe-level, encryption-based malware threat which has plagued users all over the world throughout 2018. Similar to other notorious Ransomware threats in circulation, GandCrab sneaks into target PCs via exploit kits, malicious Javascript and document email attachments, as well as through a Ransomware-as-a-Service (RaaS) affiliate program, ultimately encrypting the victims' files without their knowledge. The affected users face complete data loss unless they pay the required ransom amount, predominantly in the form of аn obscure virtual currency called DASH....

LockerGoga Ransomware

Posted: March 31, 2019 | Category: Ransomware
LockerGoga Ransomware is a file-locking trojan whose campaigns specialize in sabotaging Windows systems related to the industrial sector and other businesses. In addition to locking files and displaying its ransoming demands, LockerGoga Ransomware has a close relationship with backdoor attacks and may disable the infected machine's network connectivity. Updated anti-malware tools may remove LockerGoga Ransomware, and members of the relevant industries should guard their admin login credentials securely in self-defense. File-locker trojans are most notorious for harming small-scale,...

WannaCryptor Ransomware (WanaCrypt0r Ransomware)

Posted: March 29, 2017 | Category: Ransomware
WannaCryptor Ransomware (WanaCrypt0r Ransomware) The first major ransomware attack of 2017 involves the use of the WanaCrypt0r Ransomware, an improved version of the '.wcry File Extension' Ransomware which, unfortunately, leverages one of the leaked NSA exploits to exploit vulnerable computers running Windows XP. It is unknown which is the hacking group behind the WanaCrypt0r Ransomware attacks, but one thing is for certain – whoever they are, they certainly know what they are doing. The targets of the WanaCrypt0r Ransomware don't appear to b chosen randomly since most of the infected machines appear to belong to major companies in...

GayFreeVideos

Posted: July 24, 2009 | Category: Uncategorized

How to Remove DLL Files

Posted: June 6, 2006 | Category: Tutorials
DLL (Dynamically Link Library) is an executable file that permits programs to share code to perform one or more predefined functions. A DLL file can be used by several programs at the same time. The benefit of having DLL files is that they don't get loaded into random access memory (RAM) along with the main program, which saves up space in RAM. So instead of all the coding being built into the program, it uses a particular DLL file that, with a simple call, can execute the operation for it. Most DLL files are essential for the running of your programs but there are other malicious...

Virus.Win32.Pioneer.bl

Posted: March 11, 2013 | Category: Viruses | Threat Level: 8/10
Virus.Win32.Pioneer.bl is a computer virus that poses a serious security risk to an infected Windows computer. When infected, a system could load Virus.Win32.Pioneer.bl at startup of Windows and then allow it to create registry entries where it may perform other malicious actions without any indication to the computer user. Virus.Win32.Pioneer.bl may allow remote attackers to infiltrate the infected system where stored data may be put at risk. The modification of files and other settings may also occur from the Virus.Win32.Pioneer.bl infection.

Lemon_Duck

Posted: October 7, 2019 | Category: Malware | Threat Level: 6/10
Lemon_Duck is a worm and cryptocurrency-mining Trojan that hijacks your PC's CPU for generating cryptocurrency. Lemon_Duck contains robust support for self-distribution, and, in particular, can infect removable devices and travel throughout vulnerable networks laterally. Isolate compromised systems and have a trusted anti-malware product remove Lemon_Duck safely in all circumstances. A threat that's been mining its way through Asia is turning its sights further abroad, as the cyber-security industry is confirming its presence on multiple, enterprise-grade networks over the world. In many...

Drunk-Party-Porn

Posted: July 15, 2007 | Category: Uncategorized
Drunk-Party-Porn is a pornographic spyware cookie that is designed to track your personal information and browsing habits as you surf the Internet. Then Drunk-Party-Porn will send all the collected data to the third parties. Spyware cookies are placed on your machine by a consortium of websites that track your movement from one website to another.

How to Kill Spyware Processes

Posted: June 5, 2006 | Category: Tutorials
Every program has its own executable code (for example, the .exe file). A process (or task) is a program that is being executed. When you start a program, the executable code will load into the computer's memory. This code is the process. If a process is closed or terminated, the resources used by that program will not run. To see all the processes running on your computer, you can use the Windows Task Manager, a built-in Windows utility. The Windows Task Manager allows you to terminate almost all processes, however, there are some programs that have invisible processes running in the...

How to Delete Harmful Files

Posted: June 6, 2006 | Category: Tutorials
Every program is made of individual files, whether or not it's a regular application or a parasite. Spyware programs use harmful files to install themselves and secretly collect personal information about you. Many spyware programs use your Internet connection to access your PC and hijack your browser, monitor your Web surfing habits, change your settings, and annoy you with pop-up ads. You can delete spyware files two ways: manually, or with an anti-spyware program. To remove harmful files manually you must be familiar with computer technology. When you manually remove any computer file,...

Dr Games Ads

Posted: November 16, 2015 | Category: Adware | Threat Level: 2/10
Dr Games is an ad-oriented Web plugin, closely associated with a gaming platform. In the past, the site could be found at dr-games.com. Later the domain switched to gogy.com. This gaming site contains numerous online games, and some of them have a desktop version as well. If you agree to download any game or other software from gogy.com, the adware also may sneak in. If you can notice the symptoms of the ad-supported extension but didn't install it manually, then it may have evaded your attention hidden in the executable files of third-party freeware. Dr Games doesn't contain harmful...

How to Find Spyware with File Search Tool

Posted: June 6, 2006 | Category: Tutorials
Spyware can infect your computer and compromise your privacy, security and computer performance. Spyware is constanly changing and can infect your computer without you even being aware of it. Spyware can install onto your computer and gain access to sentitive information like your passwords, credi card numbers and emails. Spyware is very difficult to detect and remove so trying to uninstall it can prove to be a huge undertaking. If you suspect that your computer is infected with spyware, the best advice is to remove the spyware IMMEDIATELY before it exposes your computer to other...

W32/Child-Porn.PROXY/Server

Posted: December 28, 2011 | Category: Viruses | Threat Level: 8/10
W32/Child-Porn.PROXY/Server is a computer virus under a phantom name. Usually the rogue anti-spyware program known as Security Central is known for mentioning the W32/Child-Porn.PROXY/Server parasite under its bogus alert notifications or fake system scan results. Although W32/Child-Porn.PROXY/Server is commonly listed as a false positive due to its association with a fake security program, it is still a viable threat to a PC. W32/Child-Porn.PROXY/Server may load onto a system where it can cause the performance to be degraded to the point that the infected PC can no longer perform various...

R44s Ransomware

Posted: March 19, 2020 | Category: Ransomware
The R44s Ransomware is a newly discovered variant of the Ranion Ransomware. Ransomware like R44s, encrypts its victim's data and demands a ransom payment in exchange for a decryption key. Due to the secure cipher algorithm that the R44s Ransomware employs, any data encrypted by it may be lost. The R44s Ransomware is being distributed in a several ways. One of the most common tactics for distributing file-encoding viruses such as R44s is through spam emails containing corrupted attachments, which execute installation macros after being opened. The files are often Word or .pdf documents...

NEFILIM Ransomware

Posted: March 18, 2020 | Category: Ransomware
The NEFILIM Ransomware is a file-locking Trojan that's independent of any known family or Ransomware-as-a-Service (RaaS). Installations may use digital certificates as part of their disguises while sabotaging the user's media files by encrypting them. Users should always save backups appropriately for recovering and let their preferred anti-malware products contain or delete the NEFILIM Ransomware on sight. Russia is the possible origin of another file-locking Trojan's campaign, but with a name hearkening back to ancient elements of Jewish folklore. The NEFILIM Ransomware has no...

Odveta Ransomware

Posted: March 18, 2020 | Category: Ransomware
The Odveta Ransomware is a file-locking Trojan based on the KingOuroboros Ransomware. The Odveta Ransomware can keep your files from opening by encrypting them and is noted for targeting vulnerable networks through remote admin features. Users can protect themselves through securing RDP, patching vulnerabilities, and using strong passwords while having their anti-malware services delete the KingOuroboros Ransomware as soon as possible after detection. A file-locker Trojan with significant coding connections to the CryptoWire Ransomware is receiving further iteration that suggests the...

CovidLock Ransomware

Posted: March 17, 2020 | Category: Ransomware
The CovidLock Ransomware is a screen-locking Trojan that blocks Android devices by forcing a password change and displays an extortionist pop-up. The CovidLock Ransomware circulates through fake Coronavirus-tracking applications on fraudulent websites. Users should curate their downloads carefully for potential risks, let anti-malware tools remove the CovidLock Ransomware and similar threats as appropriate, and use the publicly-known key for unlocking their devices. While the COVID-19 epidemic is leaving significant economic disruption in its wake, threat actors are turning lemons into...

Remk Ransomware

Posted: March 17, 2020 | Category: Ransomware
The Remk Ransomware is a file-locking Trojan that comes from the STOP Ransomware family, a Ransomware-as-a-Service. Once on your computer, the Trojan will try to lock files by encrypting their data and ransoms the unlocking utility through its messages to the victim. Users may remove the Remk Ransomware with proper anti-malware tools safely but also should save backups regularly for recovering anything encrypted. Temporary Files Delivering Permanent Problems Since the early days of the STOP Ransomware 's family and campaigns, a la first Djvu Ransomware , Rumba Ransomware , Promos...

Hentai Onichan Ransomware

Posted: March 17, 2020 | Category: Ransomware
The Hentai Onichan Ransomware is a file-locker Trojan that's a variant of the prior Quimera Ransomware. Besides the differences in its ransom notes and extensions, it launches attacks similar to its ancestor, which will 'lock' files on your computer by encrypting them. Users can, as always, save and recover their work with appropriate backups and let reliable anti-malware products manage the removal of the Hentai Onichan Ransomware. Small families of file-locking Trojans, while not as economically substantial as their Ransomware-as-a-Service counterparts like the Djvu Ransomware or the...

Eight Ransomware

Posted: March 16, 2020 | Category: Ransomware
The Eight Ransomware is a file-locking Trojan from the Phobos Ransomware family. It can keep files from opening through encrypting them, including most digital media, such as documents, music or spreadsheets. Users should, when possible, avoid the recommendations in their ransom notes and apply anti-malware services appropriately for removing the Eight Ransomware from their computers. With the growth of very similar threat families like the Scarab Ransomware , the Globe Ransomware , and the Crysis Ransomware , it should startle few readers that a competing one, the Phobos Ransomware...

PXJ Ransomware

Posted: March 13, 2020 | Category: Ransomware
The PXJ Ransomware is a file-locker that you do not want to have to deal with. The PXJ Ransomware is incompatible with free decryption utilities, and it is able to execute a devastating file-encryption attack, which is guaranteed to cause long-term damage to your files. When the PXJ Ransomware is launched on an unprotected system, it will start off by performing several tasks that are meant to reduce the victims' chances of recovering their files. The PXJ Ransomware: Empties the recycle bin. Disables the Windows Recovery Console. Disables the System Restore service and purges the...

Foop Ransomware

Posted: March 12, 2020 | Category: Ransomware
The Foop Ransomware is a file-locking Trojan that's an update to the STOP Ransomware family, also referred to as Djvu Ransomware. Besides preventing users from accessing documents and other media, it may delete backups, block some websites from loading, and demand ransoms in text messages. Users should protect themselves equally with both anti-malware products for removing the Foop Ransomware and backups for restoring any lost files. Remaining one of the least appropriately named families of Trojans, the STOP Ransomware is a persistent part of the threat landscape that makes money off...

Horseleader Ransomware

Posted: March 12, 2020 | Category: Ransomware
The Horseleader Ransomware is a file-locking Trojan that comes from GarrantyDecrypt Ransomware's family. Although infections can include other side effects, primary issues include problems with opening the files that the Trojan encrypts, changes to extensions, and the presence of Notepad ransom notes. Users should have comprehensive backups for recovering content and anti-malware tools for removing the Horseleader Ransomware securely. The adage about horses and water is applying ironically to a new version of the GarrantyDecrypt Ransomware , a family of Trojans with significant social...

CoronaVirus Ransomware

Posted: March 12, 2020 | Category: Ransomware
CoronaVirus Ransomware is a file-locking trojan receiving distribution alongside a second threat, KPOT Stealer. Although CoronaVirus Ransomware may lock files and deliver ransom notes to victims, KPOT Stealer trojan is responsible for additional attacks regarding stealing data, such as passwords. Users should change login credentials ASAP after removing CoronaVirus Ransomware and its trojan with proper anti-malware tools. A Two-Tap Attack from a Global Pandemic The canniness with which threat actors manipulate victim psychology is coming into the spotlight with a 'new' trojan campaign...

Rocket Loader Skimmer

Posted: March 11, 2020 | Category: Ransomware
The Rocket Loader Skimmer is a new JavaScript-based skimmer that appears to show a lot of similarities with the skimmers used by the Magecart gang. Although the Rocket Loader Skimmer does not pack any interesting features in terms of the techniques it uses to exfiltrate the payment details of its victims, it uses a rather interesting trick to hide its components – its authors have opted to mask it as the 'Rocket Loader,' a service that CloudFlare uses to speed up the loading times of the websites of their customers. The fake 'Rocket Loader' script is loaded alongside the original one, and...

GTF Ransomware

Posted: March 11, 2020 | Category: Ransomware
The GTF Ransomware is a file-locking Trojan that's part of the Dharma Ransomware's Ransomware-as-a-Service group. Infections can remove backups, convert your files into non-opening versions of themselves, and demand money through multiple ransom messages. Users should depend on anti-malware software for deleting the GTF Ransomware preemptively or post-infection and secure their backups against third-party tampering. Continuing into 2020, despite the uptick in independent, file-locking Trojans, Ransomware-as-a-Service families retain their overall dominance over this illicit industry. The...

JavaEncrypt Ransomware

Posted: March 10, 2020 | Category: Ransomware
The JavaEncrypt Ransomware is a file-locking Trojan based off of the JavaLocker Ransomware project on GitHub. The JavaEncrypt Ransomware can block your files, change their extensions, and create ransom messages asking for Bitcoin payments. Users should attempt other data recovery solutions as necessary and let their anti-malware services remove the JavaEncrypt Ransomware from their computers. Free Extortion Resources for the Taking After assisting the Stantinko Botnet , the Galacti-Crypter Ransomware , and the Karkoff backdoor Trojan indirectly, GitHub's free hosting is becoming the...

MARRACRYPT Ransomware

Posted: March 5, 2020 | Category: Ransomware
The MARRACRYPT Ransomware is a file-locking Trojan that's a variant of the previous Hermes Ransomware. Symptoms of infections include problems with opening the files that it encrypts, different extensions appearing on filenames, and a campaign-specific HTML message with ransom demands. Users with a secure backup should find recovery of lost data easy, and high-quality anti-malware programs can remove the MARRACRYPT Ransomware in nearly all cases. A threat actor's campaign is giving a new coat of paint to the Hermes Ransomware , a lesser-known file-locking Trojan with a Greek...
1 2 3 4 5 6 7 8 9 10 11 340