WebDiscover Browser

Posted: July 3, 2015 | Category: Browser Hijackers | Threat Level: 5/10
The WebDiscover Browser is a type of a potentially unwanted program. It can be categorized as a browser hijacker of sorts. WebDiscover is distributed both as an installer download on its official website, as well as through software bundle installers. Software bundles often don't have sufficient disclosure of the features and items they come packed with, which is why potentially unwanted programs often piggy-back in freeware bundles. WebDiscover is a rather obtrusive web search bar that docks a search box on top of your desktop. However, you can neither move, nor close or resize that bar....

Cerber Ransomware

Posted: March 4, 2016 | Category: Ransomware
The Cerber Ransomware is a file encryptor that takes your data hostage for the sake of selling it back in return for Bitcoin currency. The general unreliability of this means of saving your files causes it to be discouraged as a solution when, instead, a sufficiently sound backup strategy can make the Cerber Ransomware's attacks relatively ineffectual. Due to the danger that the Cerber Ransomware poses to your system, data, and Web browser, malware analysts rate the Cerber Ransomware as a significant threat that should be uninstalled by dedicated anti-malware tools. The Cerber Ransomware...

GozNym

Posted: April 15, 2016 | Category: Trojans | Threat Level: 8/10
GozNym is a spyware program in deployment against prominent financial institutions, such as banks currently. This threat combines code from two previous Trojans while delivering itself through specially-crafted e-mail content. Because malware experts have rated GozNym as a sophisticated, high-level threat with the potential for collecting data, PC users should protect their machines by using dedicated anti-malware tools for deleting GozNym infections, rather than trying to detect this threat by eye. Although threat developers may recycle code from old threats to spawn new ones, in most...

WannaCryptor Ransomware (WanaCrypt0r Ransomware)

Posted: March 29, 2017 | Category: Ransomware
WannaCryptor Ransomware (WanaCrypt0r Ransomware) The first major ransomware attack of 2017 involves the use of the WanaCrypt0r Ransomware, an improved version of the '.wcry File Extension' Ransomware which, unfortunately, leverages one of the leaked NSA exploits to exploit vulnerable computers running Windows XP. It is unknown which is the hacking group behind the WanaCrypt0r Ransomware attacks, but one thing is for certain – whoever they are, they certainly know what they are doing. The targets of the WanaCrypt0r Ransomware don't appear to b chosen randomly since most of the infected machines appear to belong to major companies in...

Phobos Ransomware

Posted: October 23, 2017 | Category: Ransomware
Phobos is one of the most recent ransomware strains to join the increasingly large database of malware threats. While Phobos appears to be a new threat, much of its code bears some striking similarities to the code that built the infamous Dharma and Crysis Ransomware families not long ago. Although most cybercriminals rely on malicious email links and attachments to distribute the ransomware payload to as many target PCs as possible, there has been a marked shift towards exploiting exposed Remote Desktop Protocols instead. By using readily available scanners, the crooks search for...

GandCrab Ransomware

Posted: January 29, 2018 | Category: Ransomware
The GandCrab Ransomware is a severe-level, encryption-based malware threat which has plagued users all over the world throughout 2018. Similar to other notorious Ransomware threats in circulation, GandCrab sneaks into target PCs via exploit kits, malicious Javascript and document email attachments, as well as through a Ransomware-as-a-Service (RaaS) affiliate program, ultimately encrypting the victims' files without their knowledge. The affected users face complete data loss unless they pay the required ransom amount, predominantly in the form of аn obscure virtual currency called DASH....

LockerGoga Ransomware

Posted: March 31, 2019 | Category: Ransomware
LockerGoga Ransomware is a file-locking trojan whose campaigns specialize in sabotaging Windows systems related to the industrial sector and other businesses. In addition to locking files and displaying its ransoming demands, LockerGoga Ransomware has a close relationship with backdoor attacks and may disable the infected machine's network connectivity. Updated anti-malware tools may remove LockerGoga Ransomware, and members of the relevant industries should guard their admin login credentials securely in self-defense. File-locker trojans are most notorious for harming small-scale,...

GayFreeVideos

Posted: July 24, 2009 | Category: Tracking Cookies
GayFreeVideos is a tracking cookie that may be used by various pornographic or explicit content websites. The access of the GayFreeVideos tracking cookie may take place when visiting porn sits where certain site settings or preferences are stored. The access of the GayFreeVideos cookie could lead to pornographic sites offering other services or lead to other malware downloads through the site, as it is common for porn sites to be a source of malware. Computer users wanting to rid their system of unnecessary or unwanted tracking cookies like GayFreeVideos are recommended to utilize an...

NiceHash Miner

Posted: April 15, 2019 | Category: Malware | Threat Level: 6/10
The NiceHash Miner is a legitimate program used by the NiceHash platform, a marketplace for cryptocurrency mining where clients can either rent out their computers to mine for various cryptocurrency or purchase the mining power of other users. All of this is legitimate and happens with the approval and knowledge of users, but it would appear that groups of cybercriminals might be exploiting the NiceHash Miner tool by creating modified, stealthy versions of it. As you can probably guess, the purpose of the hidden variant of the NiceHash Miner is to work on computers without notifying the...

How to Remove DLL Files

Posted: June 6, 2006 | Category: Tutorials
DLL (Dynamically Link Library) is an executable file that permits programs to share code to perform one or more predefined functions. A DLL file can be used by several programs at the same time. The benefit of having DLL files is that they don't get loaded into random access memory (RAM) along with the main program, which saves up space in RAM. So instead of all the coding being built into the program, it uses a particular DLL file that, with a simple call, can execute the operation for it. Most DLL files are essential for the running of your programs but there are other malicious...

Omegle Phishing Virus

Posted: August 8, 2019 | Category: Browser Hijackers | Threat Level: 5/10
The Omegle Phishing Virus is a general family of threats that may redirect you from the Omegle chat service to another, corrupted website. These attacks can use browser-hijacking software or settings, or even tactic artists that operate through Omegle, itself. Users can protect themselves by checking links for safety before clicking and keeping anti-malware programs on hand for deleting the Omegle Phishing Virus in its browser-hijacking variants. Omegle has garnered both modest fame and some notoriety from the semi-anonymous nature of its chat interface, but word of mouth is something...

What is CLSID?

Posted: August 10, 2009 | Category: Tutorials
A CLSID is an acronym used to describe a software application's class ID or "class identifier." In other words, a CLSID is a unique identification number given to software applications or software components to function as a kind of 'social security number' for any particular piece of software. CLSIDs form a subcategory of 'Globally Unique Identifiers,' or GUIDs, that are regularly used in COM, and as such, CLSIDs are used to specifically identify COM objects. COM, or "Component Object Model", is a Microsoft architectural model that is applied to component software applications and...

EnCryp13d Ransomware

Posted: January 22, 2021 | Category: Ransomware
The EnCryp13d Ransomware is a threatening piece of software that causes long-lasting damage to the files it can access on compromised computers. The accessible files will have their contents encrypted, and the file-locker will also rename them by adding the '.EnCryp13d' extension. After finishing the file-encryption attack, the EnCryp13d Ransomware will drop the message 'HOW TO DECRYPT FILES.txt' on the desktop. The ransom note tells victims that they cannot use the free decryption tool, and their only chance of recovering their data is to contact the attackers and follow their...

DEcovid19bot Ransomware

Posted: January 21, 2021 | Category: Ransomware
COVID-19-themed malware continues to be popular among cybercriminals even in 2021. The latest threat to adopt a name of this type is the DEcovid19bot Ransomware. This threatening file-locker is likely to be propagated online via fake downloads, corrupted advertisements, pirated content and other shady content. Users who come across the DEcovid19bot Ransomware's files may be in a lot of danger, especially if their computers are not protected by an up-to-date anti-virus tool. The DEcovid19bot Ransomware uses a complicated file-encryption mechanism to prevent you from accessing your files...

Solaso Ransomware

Posted: January 21, 2021 | Category: Ransomware
The Solaso Ransomware is malware that can cause long-term damage to your files. Removing this threat from your system is not enough to fully recover because you will still need a reliable way to restore the encrypted files during the attack. Sadly, the Solaso Ransomware is not compatible with free decryption tools, and its victims may have a difficult time recovering their data. According to Solaso Ransomware's creators, they are willing to provide a paid decryption service, but users must agree to pay a ransom fee beforehand. Just like other ransomware creators, the ones behind this...

Esexz Ransomware

Posted: January 20, 2021 | Category: Ransomware
The Esexz Ransomware is a threat that you do not want to have to deal with. This newly spotted malware is still undergoing analysis, and, unfortunately, it is not yet clear whether its file-locking mechanism can be deciphered via free utilities. For now, the Esexz Ransomware should be considered to be a non-decryptable threat – this means that its victims will not have access to free decryption tools. The primary purpose of this Trojan is to prevent its victims from using their files. It does this by encoding the contents of dozens of files, many of which are documents, media, archives,...

Qsayebk Ransomware

Posted: January 20, 2021 | Category: Ransomware
Qsayebk Ransomware is a threat that may reach your computer via pirated content, fake downloads or deceptive advertisements. You can only fall victim to the Qsayebk Ransomware attack if you download and run a non-trustworthy file. The best way to keep your data and computer safe from such threats is to rely on up-to-date anti-virus protection, as well as only to interact with legitimate websites and files. Falling victim to the Qsayebk Ransomware attack results in losing access to a large portion of your files. Many documents, images, videos, databases, archives, and other files will...

DIS Ransomware

Posted: January 19, 2021 | Category: Ransomware
The DIS Ransomware is a newly identified file-locker that has the ability to cause long-term damage to your file system. This malware's creators' goal is to lock you out of your files and then extort you for money. Their extortion plan is to offer a decryption service, but only if the victim agrees to pay a ransom fee of a few hundred dollars. Of course, the creators of this ransomware want to be paid via Bitcoin since this ensures their anonymity and makes it impossible to cancel the transaction. You should never trust ransomware creators and paying them should be a last resort. The DIS...

DeroHE Ransomware

Posted: January 19, 2021 | Category: Ransomware
The DeroHE Ransomware is a low-quality file-locker that is still very threatening. Its authors appear to be offering several paid decryption options, and they seem to be invested in a type of cryptocurrency called DERO. According to their ransom message, victims can pay about 200 DERO coins (worth about $100) in exchange for a decryption tool. Furthermore, the crooks claim that the price of DERO will jump to $100/coin soon, and the criminals will return $500 to the victim when this happens. Needless to say, the 'financial analysis' and promises of the cybercriminals shouldn't be trusted....

Blackheel Ransomware

Posted: January 19, 2021 | Category: Ransomware
Open-source file-lockers continue to be used by low-skilled cybercriminals who are interested in crafting their personalized ransomware variant. One of the latest threats to use this strategy is the Blackheel Ransomware. Fortunately, its authors have based their threat on the HiddenTear ransomware project, which uses a flawed encryption routine. This means that while the Blackheel Ransomware causes damage to your files, it should be possible to reverse the damages with the use of free decryption software. Although the Blackheel Ransomware may be decryptable for free, it is recommended to...

Wbxd Ransomware

Posted: January 18, 2021 | Category: Ransomware
File-encryption Trojans are a threatening malware type, which may cause potentially irreversible damage to your files. One of the latest file-lockers to be identified by cybersecurity experts is the Wbxd Ransomware, and it seems to share many features with the infamous STOP Ransomware. The latter file-locker family has been very active in the past two years, and, unfortunately, it seems that 2021 might not be any different. The STOP Ransomware is not decryptable for free, and its variants also are not compatible with free decryption tools. If you fall victim to the Wbxd Ransomware, you...

TeslaRVNG1.5 Ransomware

Posted: January 15, 2021 | Category: Ransomware
The TeslaRVNG1.5 Ransomware is a new file-locker, which is based on a well-known file-locker called Ouroboros. Unfortunately, neither of these file-encryption Trojans are compatible with free decryption tools. Their victims may need to resort to alternative data recovery software and methods, which might not always work flawlessly. When the TeslaRVNG1.5 Ransomware takes over a computer, it will aim to encrypt files that the victim is likely to use on a daily basis – documents, archives, databases, media and more. The locked files are renamed by using the following pattern 'id[<VICTIM...

M88P Ransomware

Posted: January 15, 2021 | Category: Ransomware
File-encryption Trojans are a threatening piece of malware, which have the ability to cause long-term damage to the files on your computer. In many other cases, recovering from a malware attack is possible by running an up-to-date anti-virus scanner. However, in the case of the M88P Ransomware, victims may not be able to recover their files via this method. Even when the M88P Ransomware is removed successfully, the damage it managed to cause will persist and the user will be unable to use their files. The M88P Ransomware encrypts documents, videos, archives, media and many other files....

FBI Screenlocker

Posted: January 14, 2021 | Category: Ransomware
FBI Screenlocker is a threatening piece of software that might give you a great scare because of its messages' misleading contents. This software may reach your computer via a fake download, bogus email attachments, or a shady application you downloaded from the Internet. When the FBI Screenlocker is executed on an unprotected computer, it may hide the desktop with an overlay immediately, which says that the computer has been locked. According to the screen locker, the users have violated several laws (like selling drugs and propagating fascism) and they have been fined $150. The message...

Bonsoir Ransomware

Posted: January 14, 2021 | Category: Ransomware
The Bonsoir Ransomware is a newly detected file-locker, which appears to be spread online via fake email attachments, pirated media/software and other shady downloads. This threat aims to gain the ability to encrypt the files on your computer and then start to extort you for money. The extortionists behind the threatening software say that they are ready to provide a decryption tool as long as the victim pays a ransom fee first. The Bonsoir Ransomware's attack is identifiable by the '.bonsoir' extension that will be added to locked files' names. Unfortunately, this threat may inflict...

JJLF Ransomware

Posted: January 13, 2021 | Category: Ransomware
The JJLF Ransomware is a threatening file-locker meant to encrypt essential files found on your computer. After it encrypts a file, the threat will rename it by adding a new extension – '.[JamesGouldiHip@yahoo.com].<VICTIM ID>.JJLF.' In addition to this change, the malware also will create a ransom message called '#README_JJLF.rtf.' The latter file contains a message from the criminals behind the attack and reveals their intentions. According to the message, JJLF Ransomware's authors are asking to receive a significant ransom payment, and they promise to provide a decryption tool only...

Ransomweb Ransomware

Posted: January 13, 2021 | Category: Ransomware
The Ransomweb Ransomware is a peculiar project that might not be a problem for regular computer users since this malware seems to be dedicated to infiltrating Web hosting servers. The Ransomweb Ransomware was discovered on a Web server running a WordPress website recently. The owner was bothered by the fact that most of the website's files were encrypted. All of the files had the '.xploter' extension added to their names, and the website was defaced with a custom page showing a message from the attacker. Surprisingly, Ransomweb Ransomware's creators are not looking for a ransom payment –...
1 2 3 4 5 6 7 8 9 ... 369