WebDiscover Browser

Posted: July 3, 2015 | Category: Browser Hijackers | Threat Level: 5/10
The WebDiscover Browser is a type of a potentially unwanted program. It can be categorized as a browser hijacker of sorts. WebDiscover is distributed both as an installer download on its official website, as well as through software bundle installers. Software bundles often don't have sufficient disclosure of the features and items they come packed with, which is why potentially unwanted programs often piggy-back in freeware bundles. WebDiscover is a rather obtrusive web search bar that docks a search box on top of your desktop. However, you can neither move, nor close or resize that bar....

Cerber Ransomware

Posted: March 4, 2016 | Category: Ransomware
The Cerber Ransomware is a file encryptor that takes your data hostage for the sake of selling it back in return for Bitcoin currency. The general unreliability of this means of saving your files causes it to be discouraged as a solution when, instead, a sufficiently sound backup strategy can make the Cerber Ransomware's attacks relatively ineffectual. Due to the danger that the Cerber Ransomware poses to your system, data, and Web browser, malware analysts rate the Cerber Ransomware as a significant threat that should be uninstalled by dedicated anti-malware tools. The Cerber Ransomware...

GozNym

Posted: April 15, 2016 | Category: Trojans | Threat Level: 8/10
GozNym is a spyware program in deployment against prominent financial institutions, such as banks currently. This threat combines code from two previous Trojans while delivering itself through specially-crafted e-mail content. Because malware experts have rated GozNym as a sophisticated, high-level threat with the potential for collecting data, PC users should protect their machines by using dedicated anti-malware tools for deleting GozNym infections, rather than trying to detect this threat by eye. Although threat developers may recycle code from old threats to spawn new ones, in most...

WannaCryptor Ransomware (WanaCrypt0r Ransomware)

Posted: March 29, 2017 | Category: Ransomware
WannaCryptor Ransomware (WanaCrypt0r Ransomware) The first major ransomware attack of 2017 involves the use of the WanaCrypt0r Ransomware, an improved version of the '.wcry File Extension' Ransomware which, unfortunately, leverages one of the leaked NSA exploits to exploit vulnerable computers running Windows XP. It is unknown which is the hacking group behind the WanaCrypt0r Ransomware attacks, but one thing is for certain – whoever they are, they certainly know what they are doing. The targets of the WanaCrypt0r Ransomware don't appear to b chosen randomly since most of the infected machines appear to belong to major companies in...

Phobos Ransomware

Posted: October 23, 2017 | Category: Ransomware
Phobos is one of the most recent ransomware strains to join the increasingly large database of malware threats. While Phobos appears to be a new threat, much of its code bears some striking similarities to the code that built the infamous Dharma and Crysis Ransomware families not long ago. Although most cybercriminals rely on malicious email links and attachments to distribute the ransomware payload to as many target PCs as possible, there has been a marked shift towards exploiting exposed Remote Desktop Protocols instead. By using readily available scanners, the crooks search for...

GandCrab Ransomware

Posted: January 29, 2018 | Category: Ransomware
The GandCrab Ransomware is a severe-level, encryption-based malware threat which has plagued users all over the world throughout 2018. Similar to other notorious Ransomware threats in circulation, GandCrab sneaks into target PCs via exploit kits, malicious Javascript and document email attachments, as well as through a Ransomware-as-a-Service (RaaS) affiliate program, ultimately encrypting the victims' files without their knowledge. The affected users face complete data loss unless they pay the required ransom amount, predominantly in the form of аn obscure virtual currency called DASH....

LockerGoga Ransomware

Posted: March 31, 2019 | Category: Ransomware
LockerGoga Ransomware is a file-locking trojan whose campaigns specialize in sabotaging Windows systems related to the industrial sector and other businesses. In addition to locking files and displaying its ransoming demands, LockerGoga Ransomware has a close relationship with backdoor attacks and may disable the infected machine's network connectivity. Updated anti-malware tools may remove LockerGoga Ransomware, and members of the relevant industries should guard their admin login credentials securely in self-defense. File-locker trojans are most notorious for harming small-scale,...

GayFreeVideos

Posted: July 24, 2009 | Category: Tracking Cookies
GayFreeVideos is a tracking cookie that may be used by various pornographic or explicit content websites. The access of the GayFreeVideos tracking cookie may take place when visiting porn sits where certain site settings or preferences are stored. The access of the GayFreeVideos cookie could lead to pornographic sites offering other services or lead to other malware downloads through the site, as it is common for porn sites to be a source of malware. Computer users wanting to rid their system of unnecessary or unwanted tracking cookies like GayFreeVideos are recommended to utilize an...

How to Remove DLL Files

Posted: June 6, 2006 | Category: Tutorials
DLL (Dynamically Link Library) is an executable file that permits programs to share code to perform one or more predefined functions. A DLL file can be used by several programs at the same time. The benefit of having DLL files is that they don't get loaded into random access memory (RAM) along with the main program, which saves up space in RAM. So instead of all the coding being built into the program, it uses a particular DLL file that, with a simple call, can execute the operation for it. Most DLL files are essential for the running of your programs but there are other malicious...

What is CLSID?

Posted: August 10, 2009 | Category: Tutorials
A CLSID is an acronym used to describe a software application's class ID or "class identifier." In other words, a CLSID is a unique identification number given to software applications or software components to function as a kind of 'social security number' for any particular piece of software. CLSIDs form a subcategory of 'Globally Unique Identifiers,' or GUIDs, that are regularly used in COM, and as such, CLSIDs are used to specifically identify COM objects. COM, or "Component Object Model", is a Microsoft architectural model that is applied to component software applications and...

Random Music Playing Virus

Posted: October 8, 2013 | Category: Viruses | Threat Level: 8/10
The Random Music Playing Virus is a colloquial phrase identifying browser hijackers and other PC threats that load audio clips under arbitrary conditions – and, it goes without saying, without your consent. While Random Music Playing Viruses were more popular in earlier years prior to the reorganization of the threat industry as a black market business institution, occasionally a Random Music Playing Virus still is seen attacking modern computers. SpywareRemove.com malware researchers only can suggest generalized good Web-browsing habits, along with using anti-malware software as necessary,...

Misleading:Win32/Lodi!MSR

Posted: December 10, 2019 | Category: Misleading Programs | Threat Level: 10/10
Misleading:Win32/Lodi!MSR is a detection name used by the Windows Defender Antivirus. It is important to note that this detection is not associated with a particular piece of software or file and, instead, it is a so-called heuristic-based detection. This technique is being used by every reputable anti-virus product, and it allows anti-virus engines to scan files to look for particular suspicious properties – positive matches are not always a guarantee that a file is harmful, so it is entirely possible that you may see the Misleading:Win32/Lodi!MSR alert being reported for a file downloaded...

DogeCrypt Ransomware

Posted: September 18, 2020 | Category: Ransomware
Cybercriminals have evolved their attack methods and techniques over the past decade considerably. While in the past they focused on the financial gain from their attacks rarely, nowadays this seems to be their only interest. They are either trying to hijack private information from their victims, or they are looking for a way to extort them for money. The latter task is often accomplished with the use of ransomware – a malware that is able to encrypt important files, therefore rendering them inaccessible. The DogeCrypt Ransomware is a recently discovered file-locker, which appears to...

Xorist-TAKA Ransomware

Posted: September 17, 2020 | Category: Ransomware
Many modern file-lockers use flawless file-encryption routines, which make it impossible to restore from the attack without paying the attackers for help. The good news is that many cybercriminals continue to regularly rely on old and flawed ransomware projects to create new malware. This is the case with the new Xorist-TAKA Ransomware – it is based on the Xorist Ransowmare family, and, thankfully, this means that there is a significant chance that it might be decryptable for free. The Xorist-TAKA Ransomware encrypts a wide range of files, and it will add the '.TAKA' extension to the...

PewPew Ransomware

Posted: September 17, 2020 | Category: Ransomware
The PewPew Ransomware is a file-locker whose authors have put in a lot of effort to make it look like a version of the infamous Dharma Ransomware. It uses an identical-looking ransom note, and it uses the same naming pattern to manipulate the names of locked files. However, malware researchers are yet to confirm whether the PewPew Ransomware and the Dharma Ransomware share the same file-encryption method. Hopefully, this is not the case because this would mean that there is a chance that PewPew Ransomware's file-locking mechanism is flawed and could be reversed by cybersecurity experts....

Wannacry666 Ransomware

Posted: September 17, 2020 | Category: Ransomware
Cybercriminals continue to rely on dangerous file-lockers to give them an opportunity to extort innocent computer users for ransom fees. Threats like the newly spotted Wannacry666 Ransomware may be distributed online by using various methods and tricks, and falling victim to their attacks may have terrible consequences for your files. The Wannacry666 Ransomware, in particular, is able to execute a very swift file-encryption attack, which renders important files inaccessible. Recognizing the files that the Wannacry666 Ransomware locks will be easy because of the '.wannacry666' extension that...

TEREN Ransomware

Posted: September 17, 2020 | Category: Ransomware
Another file-encryption Trojan is being spread online by cybercriminals, and, unfortunately, it has already managed to infect a fair number of computers around the world. Users who fall victim to TEREN Ransomware's attack may end up losing access to many of their essential files – this happens because the malicious software uses a secure file-encryption routine to lock the contents of valuable files. Once the TEREN Ransomware's attack is finished, the threat will deploy a ransom note, which sheds some light on the situation. According to TEREN Ransomware's ransom message, victims of the...

Lina Ransomware

Posted: September 16, 2020 | Category: Ransomware
The Lina Ransomware is a file-locking Trojan that's part of the Dharma Ransomware family, a Ransomware-as-a-Service. The Lina Ransomware can wipe local backups, block files with encryption for holding them for ransom, change files' extensions, and create ransom notes. Most anti-malware programs will detect and remove the Lina Ransomware before it endangers any files sufficiently, although a secured backup also is preferable for all users. File-locking Trojans from the  Dharma Ransomware  business, a Ransomware-as-a-Service, are prolific incredibly, if not necessarily very different...

VuLiCaPs Ransomware

Posted: September 16, 2020 | Category: Ransomware
While ransomware threats usually operate in the same manner, it is essential to note that there are often significant differences between their security and efficiency. For example, the Xorist Ransomware is one of the less secure file-locker families, and, thankfully, threats based on it are often decryptable for free. This might be the case with a newly released file-locker called VuLiCaPs Ransomware. Its authors have opted to plagiarize the original Xorist Ransomware code, which means that both of these threats use an identical file-encryption routine that might be crackable for free....

AHP Ransomware

Posted: September 16, 2020 | Category: Ransomware
The AHP Ransomware is a file-locking Trojan from the Ransomware-as-a-Service known as the Crysis Ransomware and the Dharma Ransomware. The AHP Ransomware deletes the user's local backups while encrypting their media and holding it for ransom. Users can protect themselvesand their machines by securing their backups adequately and having available anti-malware software for removing the AHP Ransomware upon detecting the threat. Fake parts of Windows can be a convenient mask for Trojans, which often are compatible with that operating system and require avoiding attention until they finish...

NPPH Ransomware

Posted: September 16, 2020 | Category: Ransomware
The NPPH Ransomware is a threat that you do not want to have to deal with ever. The NPPH Ransomware attack can impair your system entirely by encrypting files that you would want to use daily – documents, spreadsheets, pictures, and many others. Whenever the NPPH Ransomware encrypts a file, it will add a new extension to its original name, making it easier to spot. So, if you see the extension '.npph' among your files' names, then it is certain that the NPPH Ransomware has penetrated your system's defenses. Unfortunately, undoing the NPPH Ransomware's damage may be a very challenging...

Chuk Ransomware

Posted: September 15, 2020 | Category: Ransomware
The Chuk Ransomware is a file-locking Trojan that's part of the Dharma Ransomware family, a long-known Ransomware-as-a-Service. The Chuk Ransomware infection methods may use brute-force attacks, torrents, or e-mail attachments, after which the threat blocks digital media files and holds them for ransom. Appropriate backup protocols will deflect most of the dangers from infections, and worthwhile anti-malware tools can remove the Chuk Ransomware. As Trojans families rise and fail, some entities in the threat landscape maintain overall longevity that's unmistakable....

Hbdalna Ransomware

Posted: September 15, 2020 | Category: Ransomware
The Hbdalna Ransomware is a file-locker Trojan from the family of the Snatch Ransomware. The Hbdalna Ransomware may reboot the computer into Safe Mode before blocking media files with secure encryption and holding them for ransom. Users should protect themselves with both backups and anti-malware utilities for enabling the prompt removal of the Hbdalna Ransomware. The Snatch Ransomware 's file-locking Trojan family intends to leave an impression in 2020, with new variants and campaigns appearing regularly. Although most of these new versions have yet-to-be-examined infection...

Blm Ransomware

Posted: September 14, 2020 | Category: Ransomware
The Blm Ransomware is a file-locking Trojan that's part of the Dharma Ransomware's Ransomware-as-a-Service. Despite its name and referential e-mail address, it has no relationship with the Black Lives Matter political movement. Users can best protect any files from these attacks by saving backups to secure locations and having their anti-malware products up-to-date to flag and remove the Blm Ransomware. News, fads, and popular media themes, in the political sphere and outside of it, are cultural touchstones that Trojans and their threat actors can appropriate, just as much as anyone...

BD Ransomware

Posted: September 11, 2020 | Category: Ransomware
The BD Ransomware is a file-locking Trojan that can block media on your computer by encrypting it. This attack targets documents, pictures, and similar content for holding for ransom. Appropriate backups often are the only viable recovery method afterward, although anti-malware products should remove the BD Ransomware before it starts encrypting anything. The occasional attack by a file-locking Trojan that's an independent project serves as a reminder that Ransomware-as-a-Services aren't the only forces still using encryption attacks for making money. In the former category, a minor...

Tomas Ransomware

Posted: September 10, 2020 | Category: Ransomware
The Tomas Ransomware is a file-locker Trojan that blocks digital media files for ransom. The Tomas Ransomware shares most of its symptoms with other threats of this type, although it also delivers ransom notes with unique addresses and appends a custom extension onto the files. A majority of anti-malware programs will detect and remove the Tomas Ransomware from Windows environments immediately before losing files. Since their business operations tend to benefit from similar features, such as changes to files' names, cryptocurrency ransoms, and the all-important encryption of data,...

Eur Ransomware

Posted: September 10, 2020 | Category: Ransomware
The Eur Ransomware is a file-locking Trojan that's part of the Dharma Ransomware, a Ransomware-as-a-Service family. These threats will block the victim's files, such as most digital media, with encryption that usually is unbreakable by third parties. Appropriate anti-malware services may remove the Eur Ransomware or block its installation exploit and secure backups ca mitigate data loss significantly. Among file-locking Trojans, there exist philosophies catering to both the low and high customer demographics. For the Dharma Ransomware , the 'low' is paying off, with many threat actors...
1 2 3 4 5 6 7 8 9 10 11 356