Cerber Ransomware

Posted: March 4, 2016 | Category: Ransomware
The Cerber Ransomware is a file encryptor that takes your data hostage for the sake of selling it back in return for Bitcoin currency. The general unreliability of this means of saving your files causes it to be discouraged as a solution when, instead, a sufficiently sound backup strategy can make the Cerber Ransomware's attacks relatively ineffectual. Due to the danger that the Cerber Ransomware poses to your system, data, and Web browser, malware analysts rate the Cerber Ransomware as a significant threat that should be uninstalled by dedicated anti-malware tools. The Cerber Ransomware...

GozNym

Posted: April 15, 2016 | Category: Trojans | Threat Level: 8/10
GozNym is a spyware program in deployment against prominent financial institutions, such as banks currently. This threat combines code from two previous Trojans while delivering itself through specially-crafted e-mail content. Because malware experts have rated GozNym as a sophisticated, high-level threat with the potential for collecting data, PC users should protect their machines by using dedicated anti-malware tools for deleting GozNym infections, rather than trying to detect this threat by eye. Although threat developers may recycle code from old threats to spawn new ones, in most...

WebDiscover Browser

Posted: July 3, 2015 | Category: Browser Hijackers | Threat Level: 5/10
The WebDiscover Browser is a type of a potentially unwanted program. It can be categorized as a browser hijacker of sorts. WebDiscover is distributed both as an installer download on its official website, as well as through software bundle installers. Software bundles often don't have sufficient disclosure of the features and items they come packed with, which is why potentially unwanted programs often piggy-back in freeware bundles. WebDiscover is a rather obtrusive web search bar that docks a search box on top of your desktop. However, you can neither move, nor close or resize that bar....

GandCrab Ransomware

Posted: January 29, 2018 | Category: Ransomware
The GandCrab Ransomware is a severe-level, encryption-based malware threat which has plagued users all over the world throughout 2018. Similar to other notorious Ransomware threats in circulation, GandCrab sneaks into target PCs via exploit kits, malicious Javascript and document email attachments, as well as through a Ransomware-as-a-Service (RaaS) affiliate program, ultimately encrypting the victims' files without their knowledge. The affected users face complete data loss unless they pay the required ransom amount, predominantly in the form of аn obscure virtual currency called DASH....

Phobos Ransomware

Posted: October 23, 2017 | Category: Ransomware
Phobos is one of the most recent ransomware strains to join the increasingly large database of malware threats. While Phobos appears to be a new threat, much of its code bears some striking similarities to the code that built the infamous Dharma and Crysis ransomware families not long ago. Although most cybercriminals rely on malicious email links and attachments to distribute the ransomware payload to as many target PCs as possible, there has been a marked shift towards exploiting exposed Remote Desktop Protocols instead. By using readily available scanners, the crooks search for...

LockerGoga Ransomware

Posted: March 31, 2019 | Category: Ransomware
LockerGoga Ransomware is a file-locking trojan whose campaigns specialize in sabotaging Windows systems related to the industrial sector and other businesses. In addition to locking files and displaying its ransoming demands, LockerGoga Ransomware has a close relationship with backdoor attacks and may disable the infected machine's network connectivity. Updated anti-malware tools may remove LockerGoga Ransomware, and members of the relevant industries should guard their admin login credentials securely in self-defense. File-locker trojans are most notorious for harming small-scale,...

WannaCryptor Ransomware (WanaCrypt0r Ransomware)

Posted: March 29, 2017 | Category: Ransomware
WannaCryptor Ransomware (WanaCrypt0r Ransomware) The first major ransomware attack of 2017 involves the use of the WanaCrypt0r Ransomware, an improved version of the '.wcry File Extension' Ransomware which, unfortunately, leverages one of the leaked NSA exploits to exploit vulnerable computers running Windows XP. It is unknown which is the hacking group behind the WanaCrypt0r Ransomware attacks, but one thing is for certain – whoever they are, they certainly know what they are doing. The targets of the WanaCrypt0r Ransomware don't appear to b chosen randomly since most of the infected machines appear to belong to major companies in...

GayFreeVideos

Posted: July 24, 2009 | Category: Uncategorized

Search Pulse

Posted: March 28, 2018 | Category: Potentially Unwanted Programs (PUPs)
The Search Pulse is a dubious extension for Google Chrome, which might promise to enhance the users' Web searching experience by introducing them to a brand new search engine, which features a set of convenient tools and utilities. Unfortunately, this is not what you are going to get when you install the Search Pulse because the search engine it promotes is not as reputable and functional as Yahoo, Google, Bing or other popular choices certainly. Users who opt to add the Search Pulse to Google Chrome will need to give this add-on the permission to change both their default search engine...

How to Remove DLL Files

Posted: June 6, 2006 | Category: Tutorials
DLL (Dynamically Link Library) is an executable file that permits programs to share code to perform one or more predefined functions. A DLL file can be used by several programs at the same time. The benefit of having DLL files is that they don't get loaded into random access memory (RAM) along with the main program, which saves up space in RAM. So instead of all the coding being built into the program, it uses a particular DLL file that, with a simple call, can execute the operation for it. Most DLL files are essential for the running of your programs but there are other malicious...

Bot Ransomware

Posted: October 29, 2019 | Category: Ransomware
The Bot Ransomware is a new variant of the infamous Dharma Ransomware that comes with a new extension added to the encrypted data, as well as a new email contact for getting in touch with the crooks behind it. Everything else in terms of features and modus operandi is practically identical to the Dharma Ransomware . While a typical Dharma Ransomware attack may feature one appendix or another, never before has it appended the ‘.id-XXXXXXX.[admin@sectex.net].bot!’ extension to each file it encrypts. Nor has it featured the contact email admin@sectex.net, either. However, if victims do...

Dr Games Ads

Posted: November 16, 2015 | Category: Adware | Threat Level: 2/10
Dr Games is an ad-oriented Web plugin, closely associated with a gaming platform. In the past, the site could be found at dr-games.com. Later the domain switched to gogy.com. This gaming site contains numerous online games, and some of them have a desktop version as well. If you agree to download any game or other software from gogy.com, the adware also may sneak in. If you can notice the symptoms of the ad-supported extension but didn't install it manually, then it may have evaded your attention hidden in the executable files of third-party freeware. Dr Games doesn't contain harmful...

QSnatch

Posted: October 31, 2019 | Category: Malware | Threat Level: 6/10
QSnatch is the name of a newly discovered piece of malware aimed against QNAP NAS equipment exclusively. Capable of causing varying damage, Qsnatch installs itself into the firmware of the targeted Network Attached Storage device directly before establishing a communication channel with a remote Command-and-Control (C&C) server. Researchers consider QSnatch an updated variant of the Caphaw malware which used to infect individual rather than networked devices. QSnatch’s communication with the C&C occurs via specific domain generation algorithms. As a result, the malware is...

Microsoft Security Essentials Alert Virus

Posted: August 21, 2012 | Category: Fake Warning Messages
Microsoft Security Essentials Alert Virus The Microsoft Security Essentials Alert Virus is a ransomware Trojan that imitates the pop-up alerts of Microsoft Security Essentials to encourage you to pay an illegal fine through one of several methods. Because Microsoft Security Essentials Alert Virus may block other programs to prevent you from removing Microsoft Security Essentials Alert Virus and its pop-up, SpywareRemove.com malware analysts recommend disabling Microsoft Security Essentials Alert Virus's startup exploits prior to any anti-malware scans that could delete Microsoft Security Essentials Alert Virus safely. Contrary to...

COCKROACH_LOCKER Ransomware

Posted: October 28, 2019 | Category: Ransomware
A new ransomware has been spotted in the wild by security researchers. The new ransomware has been called the Cockroach Locker Ransomware tentatively, after the file extension it uses. Files scrambled by the Cockroach Locker Ransomware receive the .[cockroach@cock.lu].COCKROACH extension. This means that a file that was named "ledger.xlsx" originally will turn into "ledger.xlsx.[cockroach@cock.lu].COCKROACH" once encrypted by the ransomware. There is little information about the internals of the encryption that Cockroach Locker uses, but there is some conjecturing that it might be a new...

How Do You Know if a Registry Entry is Malware or Safe

Posted: March 3, 2009 | Category: Tutorials
Here are some common symptoms when a registry is infected with spyware. Spyware applications may fill your registry with unwanted files, orphaned applications and other trash that can cause slower operating speeds. If your registry is populated with malicious entries, constant blue screens may appear. The screen freezes when you turn your PC on and you may be unable to use your keyboard or the mouse when you attempt to boot to safe mode. Spyware applications may make registry modifications which can make your system begin to display random error messages or cause crashes. A...

MDRL Ransomware

Posted: August 1, 2019 | Category: Ransomware
The MDRL Ransomware is a new file-locking Trojan from the AES-Matrix Ransomware's Ransomware-as-a-Service. The MDRL Ransomware can lock your files with encryption, which places documents and other, prominent media formats in an extortionist, hostage situation. Users should back their work up for preventing this circumstance and have a trusted anti-malware program delete the MDRL Ransomware, or isolate it safely. File-locking Trojans from the AES-Matrix Ransomware 's family aren't up to the same numbers as their more-fecund counterparts in the underground industry, such as the Scarab...

Redrum Ransomware

Posted: December 6, 2019 | Category: Ransomware
The Redrum Ransomware is a newly spotted file-encryption Trojan that is yet to be analyzed thoroughly. However, the initial indications are that it uses an encryption routine that cannot be deciphered, and its victims will only be able to restore their data from a backup copy. If a backup is not available, then they might have partial success with the use of alternative data recovery options, but it is unlikely that they will be able to make a full recovery. The purpose of the Redrum Ransomware is not surprising – once the ransomware infects a host, it will launch a file-encryption attack...

CILLA Ransomware

Posted: December 5, 2019 | Category: Ransomware
The CILLA Ransomware is a file-encryption Trojan whose devastating attack can cause permanent damage to your files potentially. Ransomware attacks are harmful exceptionally because their purpose is to encrypt a large portion of your data and then offer to sell you a decryption service that can often cost hundreds or even thousands of dollars. To make matters even worse, the threat actors behind these attacks provide proof that the decryption of your files is possible rarely and also demand to be paid via Bitcoin or another cryptocurrency – payment methods, which make it impossible to track...

Righ Ransomware

Posted: December 5, 2019 | Category: Ransomware
The Righ Ransomware is a high-profile cyber-threat whose attack is capable of causing potentially irreversible damage to documents, images, archives, databases, videos and other commonly used file formats. This threat might be distributed online via several tricks and techniques – torrent trackers, pirated adult videos, pirated games and software, bogus email attachments, etc. If the users end up running the Righ Ransomware on their computers, it may take the harmful application just a few minutes to accomplish its goal and leave the victim with a hard drive full of encrypted files. The...

LockBit Ransomware

Posted: December 4, 2019 | Category: Ransomware
The best way to protect yourself from file-encryption Trojans is to invest in a reliable data backup service, as well as ensuring that your system is secured by a reputable anti-virus product that receives regular updates. Unfortunately, many people's computers are still lacking the necessary ransomware protection, and they are the group of users that the authors of the LockBit Ransomware are likely to go after. This new file-locker is able to complete its devastating attack in a matter of minutes, allowing it to leave its victim with a hard drive full of corrupted documents, images,...

PyXie RAT

Posted: December 3, 2019 | Category: Ransomware
The PyXie RAT is a Remote Access Trojan (RAT) written in the Python programming language. The first samples of this threat were found by cybersecurity labs in 2018, but the threat was not that widespread back then. However, it appears that the operators of the PyXie RAT are expanding their campaign, and multiple samples of the Trojan have been found in the wild. This Remote Access Trojan appears to be very well-made, and it is likely that the threat actor behind it is very experienced when it comes to developing RATs. The malware borrows code and ideas from several high-profile threats to...

Msop Ransomware

Posted: December 3, 2019 | Category: Ransomware
The Msop Ransomware is a file-locker whose primary function is to encrypt a wide range of file types found on the hard drives of its victims. In addition to encrypting the data found on the hard drive or SSD, the threat also is able to encrypt files on removable storage devices. Whenever the Msop Ransomware encrypts the contents of a file, it will make sure to manipulate the file's original name by appending the '.msop' extension. 2019 has been the year of the STOP Ransomware family – its operators have released nearly two-hundred variations of the threatening file-locker, and the latest...

Hets Ransomware

Posted: November 29, 2019 | Category: Ransomware
The Hets Ransomware is a file-encryption Trojan, which may be distributed online under the disguise of a cracked game, software suite keygen, pirated movie, or other digital content that is likely to attract the attention of the users. However, users who come across one of Hets Ransomware's copies may end up putting their files in big danger – this is because this threat focuses on causing harm to its victim's file system by encrypting a wide range of documents, images, videos, archives, etc. Of course, the attack does not end here – the Hets Ransomware also provides its victims with a...

Nyton Ransomware

Posted: November 29, 2019 | Category: Ransomware
A new file-locker is being detected by anti-virus engines, and it has been given the name Nyton Ransomware. The good news is that anti-virus products detect this new threat with ease, and users who have taken the necessary measures to secure their computers are unlikely to fall victim to this file locker devastating attack. Unfortunately, users without proper cybersecurity tools installed may end up being prone to the Nyton Ransomware's attack. If you end up having your computer infected by the Nyton Ransomware, you may soon lose access to your relevant documents, images, archives, videos,...

IMI Ransomware

Posted: November 29, 2019 | Category: Ransomware
File-encryption Trojans continue to be the most profitable hacking tools in the arsenal of cybercriminals and, unfortunately, this is unlikely to change unless computer users start to take their computer's security more seriously. The purpose of file-encryption Trojans is to corrupt the files of their victims, and then offer to recover it in exchange for money – the payment is usually made via a cryptocurrency, and the victims rarely get reliable proof that they will have their data restored after they complete the payment. Another major problem is how easy it is for cybercriminals to get...

Bitx Ransomware

Posted: November 28, 2019 | Category: Ransomware
File-lockers continue to be one of the most widely spread cyber-threats, and, unfortunately, they continue to be a very successful business for cybercriminals because of the hundreds of thousands of users who have not taken the required measures to secure their computers and their data. One of the most active ransomware families is the Dharma Ransomware – it has been around for over three years, and it has a rather interesting history. In 2018, its operators released a database containing a large number of decryption keys that allowed its victims to recover their data free of charge....

SaveTheQueen Ransomware

Posted: November 28, 2019 | Category: Ransomware
A group of cybercriminals claims to be able to decrypt files locked by any ransomware, and they advertised their services on a public website. In addition to offering this service, they also pose as experienced malware developers who work with high-profile threat actors and often launch attacks that target large international companies. However, this group, calling themselves 'Malicioussecurityservices,' are bluffing – they are not good at what they do certainly, and do not have the tools and data required to help ransomware victims most certainly. The group also claims to be the developer...

MarioLocker Ransomware

Posted: November 28, 2019 | Category: Ransomware
The MarioLocker Ransomware is a peculiar file-locker that was spotted on an online file scanning service by security researchers. Trying to run the corrupted binary in a controlled environment revealed the threat purpose quickly – to encrypt the users’ data, and then drop a ransom note on their computers. After completing the file-encryption attack, the ransomware creates a ransom message, which instructs users to open a decryption tool on their computers, which can be used to complete the data recovery process. However, there is a catch – the tool will only work if it is paired with the...

Calum Ransomware

Posted: November 27, 2019 | Category: Ransomware
Despite the increasing number of ransomware threats active in the wild, many users continue to underestimate the importance of regular data backups, and the peace of mind that a reputable anti-virus product can offer. Threats like the Calum Ransomware are being spread via spam emails, fake downloads, malvertising, torrent trackers, and many other malware propagation channels. If you happen to run a copy of the Calum Ransomware on your computer, then the threat may need no more than a few minutes to cause long-lasting damage to your file system by encrypting the contents of various file...

Zobm Ransomware

Posted: November 26, 2019 | Category: Ransomware
Ransomware threats continue to run rampant, and their targets are often chosen arbitrarily – sometimes, it might be an unknown computer user from a random part of the world, and in another case, it might be a high-profile company whose network has been compromised. Regardless of what user type you are, the consequences of being attacked by ransomware are always devastating – these threats are able to cause severe data loss, and it might often be very difficult to recover from their attacks. One of the most effective ransomware families in the past two years has been the STOP Ransomware –...

Kharma Ransomware

Posted: November 26, 2019 | Category: Ransomware
The operators of the Dharma Ransomware family appear to be running out of ideas when it comes to naming recent variations of their file-locker. One of the latest variants has been given the name Kharma Ransomware, and it is as threatening as any of the already known variants of the Dharma Ransomware. If you happen to become one of the Kharma Ransomware's victims, then you may end up being unable to access the majority of the documents, images, songs, archives, videos, and other files stored on your computer. This is because the Kharma Ransomware uses a complicated file-encryption scheme...
1 2 3 4 5 6 7 8 9 10 11 334