Shamoon Malware

Detected in 2012 by Forcepoint (former Websense), Seculert and Kaspersky, Shamoon malware, aka Disttrack, has returned. On the 17th of November, 2016, at 20:45 local time Shamoon attacked a Saudi oil company Aramco. 30,000 computers have been affected. Shamoon, in the previous and in the recent attacks, has aimed at deleting the data from hard … Continued

Shlayer Trojan

Shlayer Trojan is malware that targets Mac users with fake Flash Player updates and installs adware on their devices. It’s an extremely popular trojan that’s attempted to infect millions of Macs around the world. Those who got Shlayer Trojan see their apps crash, their internet connection slow down, and pop-up ads in their browser and … Continued

SilentFade Spyware

SilentFade is a trojan that was used to hack social media accounts. Rather than stealing the accounts, the cybercriminals behind SilentFade used them to display ads, paying for the advertising with money stolen from the account owners. Although SilentFade has had its wings clipped, it appears to still be spreading online and infecting Windows computers. … Continued

Sirefef

Sirefef (aka Trojan.Dropper.Sirefef) is a malicious multicomponent trojan family, which modifies search results, generated pay-per-click traffic for cybercriminals. This family consists of different components, which performs different tasks like downloading updates and additional malware, then hiding it from the system and running payloads. This classifies it as Dropper Trojan. Sirefef variants may display pop up … Continued

Skype Virus

Skype virus is a trojan, distributed through Skype network only.  This trojan is spread via Skype. This is how it works. A victim receives a message containing a link sent by one of his (her) Skype friends. The message might mention your name and look real. All of the infected persons friends using Skype receive … Continued

SmokeLoader trojan

While Fifa World Cup 2018 is taking place the new virus releases have decreased significantly, and yet it seems like this event didn’t affect the old malware, whose updated variants are coming back to life ready to shake the ground of the virtual world. A few days ago we wrote about Zacinlo, which after a few … Continued

Smss.exe

If you notice Smss.exe process currently running in the Windows Task Manager, do not be hasty to panic. What is this file? What does it do? Actually, this is a regular procedure in Windows OS devices and if the legitimate version is present in your system, there is no need to express concerns. However, malicious … Continued

Soft Cores Miner

Soft Cores Miner, also known as systemcore.exe is a dangerous trojan that aims to infect computers and secretly mine cryptocurrencies by stealing computing power and causing all kinds of troubles. The biggest problem regarding trojans like this – they are really difficult to detect. Things get easier if you have reliable anti-malware tool installed on … Continued

SpyEye

SpyEye (or EyeSpye) is a Trojan horse, which has almost the same codebase as Zeus Trojan. Just like infamous Zeus, SpyEye collects certain information on the compromised computer and additionally uploads it to command-and-control servers. To make it possible, this trojan includes wide range of components depending on configuration: it may have contain modules for … Continued

StartWebLogic.exe CPU Miner

StartWebLogic.exe CPU Miner is a sneaky computer virus that is looking to infect as much systems as possible and turn them into slaves – the miner uses power of certain computer components (CPU or GPU) and mines cryptocurrencies. Even though it is not as dangerous as ransomware viruses or keyloggers, that can directly steal your … Continued

Stresspaint malware

Stresspaint (or the Relieve Stress Paint Tool) malware is a new cyber threat, and security researchers are warning that it is a very sophisticated variant. The infection uses highly-professional methods of distribution and is capable of stealing users credentials, personally-identifiable information, and could even initiate deceptive advertising campaigns. A lot of free programs might seem … Continued

Sweep Clean PC Pro

Sweep Clean PC Pro is a trojan program which disguises itself as a technical support application. These type of apps generally display pop-ups of fake security warnings. It is a sneaky marketing trick to make up a problem and offer solutions on how to solve it, which makes a myriad of people to fall for … Continued

TDSS rootkit

TDSS Rootkit or TDSS is Trojan that is designed to work together with malware. Once this rootkit manages to get inside the system, it downloads and executes other threats, interrupts its victims with annoying ads and disables them from using security and other programs. It is known under several names, like Alureon, TDL3, TDL4, and … Continued

TeleGrab malware

End-to-end encrypted instant messaging service Telegram is very popular among those who seek to secure their conversations and avoid personal data leakage. The popularity of this application was highly boosted after the recent Facebook data scandal – a lot of users are looking for other methods to communicate online and do it privately, without having to … Continued

Telegramdesktop Virus

Telegram is a messaging application that’s remarkable for its uncompromising end-to-end encryption. Telegram offers its own clients for Android, iOS, PC, Mac, and Linux platforms. Unfortunately, scammers have set up a few fake websites that impersonate Telegram and offer malware disguised as a Telegram client. These fake websites use deceptive advertisements to spread. The malware … Continued

„This website has been blocked for you!” Virus

“This website has been blocked for you!” is a warning that appears when visiting some websites and it’s caused by a Trojan-type infection that causes redirects to malicious websites. You’re shown this scary alert indicating that the page you attempt to open is blocked as a consequence of a recent “spam bot like” activity. The … Continued

Ticno Trojan

Ticno trojan has been recently detected by the Russian cyber security company Dr.Web as Trojan.Ticno.1537. Despite the fact that this trojan is distributed in the manner similar to such simple malicious programs as adwares or browser hijackers, which is the method of free software bundling, Ticno trojan has elaborate anti-detection mechanisms such as the scanning … Continued

Tobfy Trojan

Tobfy Trojan is a nasty ransomware that mostly spreads on computers through Citadel botnet and some other means. It modifies system parameters, interrupts your regular computer activities, it can download various malware infections and viruses, such as FBI ransomware, West Yorkshire Police virus, Cybercrime Investigation Department, etc. Tobfy Trojan causes system slowdown or it can … Continued

TrickBot Trojan

TrickBot trojan was released in the September (2016). It was discovered by the cyber security researchers of Fidelis Cybersecurity and is generally regarded as the new version of Dyre, also known as Dyreza – the Russian banking trojan, which had been active since 2014. The latter malware, or better to say the hackers behind Dyre, … Continued

Trojan backdoor.11.Win32.xnco

Trojan backdoor.11.Win32.xnco is nothing else but fake virus, reported in order to trick PC users into believing that it was detected on their PCs by anti-virus program. However, in reality this fake threat is connected to Enhanced Protection Mode scam and hackers who invented it for the fraudulent reasons. Make sure you ignore Trojan backdoor.11.Win32.xnco … Continued

Trojan-BNK.Win32.Keylogger.gen

Don’t fall into misleading information about Trojan-BNK.Win32.Keylogger.gen which can be announced to be detected on your machine. In reality, it’s only XP Internet Security 2010, Internet Security 2013 or Win 7 Protection 2013 rogueware which uses such invented threats to make you scared about your Pc’s security. Trojan-BNK.Win32.Keylogger.gen is an imaginary infection, a made-up virus which … Continued

Trojan.DNSChanger

Trojan.DNSChanger is generic name for Trojans that have ability to change name servers for internet connections. Name servers are responsible in the way domains are resolved, so malware can display completely different websites instead the ones you are looking for. This results in search engine redirection, blockage of legitimate websites (including antivirus makers) and showing … Continued

Trojan.Downloader

Trojan.Downloader is a label used by antivirus programs for a certain kind of malware. It is a trojan that downloads malware on the computer, saves it, and runs it. Trojan.Downloader is dangerous because it installs malware. Most instances of Trojan.Downloader affect Windows computers. However, Mac, Android, and even Linux have examples of Trojan.Downloader that threaten their … Continued

Trojan.Generic

Trojan.Generic is an undetermined parasite detected by multiple antivirus vendors from various signs. This means that the file detected is malicious. While it is impossible to figure the exact nature of such detection, one can assume that this PC is compromised. The term Trojan determines the distribution methods of this parasite. All such infections are … Continued

JackServn Trojan

As of early May, 2018 many antivirus programs have noticed a new, active JackServn trojan family variant roaming around the virtual world. It is believed that the initial release of JackServn trojan was around 2015, followed by many other versions, with the current trojan.jackservn amongst them. JackServn trojan gets really dangerous once it sneaks into … Continued

Trojan.Maljava

Trojan.Maljava (Symantec) or Mal/JavaCmC (Sophos) is Java – based Trojan parasite that can target both PCs and Macs. Current Maljava version uses same vulnerability on both platforms, which is allready closed on patched up versions of all OSes. You can get attacked by this trojan if you visit exploit pages, which can be hosted on … Continued

Trojan.FakeAlert

Trojan.FakeAlert is one of a group of trojans, which promote rogue anti-spyware and other rogue programs, just like the Zlob trojan. Trojan.FakeAlert infects the system insidiously and changes the desktop background image into a message, which says the user is infected. This is done to intimidate the user so he would buy the fake "licensed … Continued

Trojan.Ransomlock

Trojan.Ransomlock is a nasty piece of ransomware, which can really wreck one’s nerves. This parasite infects the system by exploiting various security holes in your system. Upon infection it drops several entries in the registry, which disable Task Manager, Registry Editor and Safe Mode as a self-defense move. It will then lock the desktop and … Continued

TrustedInstaller

TrustedInstaller is very important to the Windows OS. It helps with updates and it stops you from deleting or corrupting important system files. However, sometimes, it denies you access to your files and causes various applications to malfunction. Other times, it is impersonated or hijacked by malware and used to take control of your system. TrustedInstaller … Continued

“Update Flash Player” Mac Scam

The “Update Flash Player” scam is harassing Mac users with fake macOS system alerts. It is meant to make money for shady advertising companies by tricking people to install some malware. These fake “Update Flash Player” sites have nothing to do with the real Adobe and actually download an adware installer called AdobeFlashPlayerInstaller.dmg (). How … Continued

“Update your browser” redirect

The ‘Update your browser’ alert is a totally misleading message which is displayed in order to make users download and install malicious data into their PCs. It can be linked to malware creators because these ‘updates’ that are offered to download are infected and additionally will let rogue anti-spyware programs, trojans or other malware get … Continued

URL:Mal Virus Pop-up

URL:Mal is the name used by some antivirus programs for malicious websites. Whether it’s you or a program that attempts to connect to a website that’s suspected to be harmful, a pop-up saying “We’ve safely aborted connection on […] because it was infected with URL:Mal.” The name URL:Mal is mostly used by Avast and its subsidiary … Continued

Vatico Monero Miner Virus

Your computer can be used as a slave and hacekrs do it with the help of Vatico Monero Miner virus. It is classified as a trojan horse, and once deployed on the computer it uses the resources of device to mine Monero cryptocurrency. Mining virutal currency might be a good way to monetise your computer … Continued

Vbs:malware-gen

The threat we are going to write about today is vbs:malware-gen virus. This malware has been bothering mostly Avast and some other antivirus users, mostly when they would visit online shop Amazon web pages or stream videos from Twitch.tv. The notifications of this parasite later become so persistent, claiming that there is a virus and … Continued

Vidar Spyware

Vidar is a trojan that can steal data from the infected computer, as well as download and install additional malware. It’s based on an older trojan called Arkei and sometimes these two names are used to refer to the same infection. At worst, Vidar could cause your accounts to be hacked, your contacts to be … Continued

Trojan Brontok

The real Brontok virus originates from Indonesia and is mass mailing trojan parasite. Typically, it is distributed through USB drives, spam mails or network shares. During infection, it copies itself in %AppData% folder of current user and is launched on each PC start. Then it creates copies of itself in multiple folders using names of … Continued

Web Surf Shield virus

Web Surf Shield virus is a Trojan that can infiltrate into random computers and disturb your work on Internet Explorer, Mozilla Firefox or Google Chrome. It displays an alert when you try to open any website saying that the access to that page has been temporarily blocked and you can continue browsing only after installing … Continued

Win32.Dofoil

Win32.Dofoil is a malicious Trojan that is designed to receive and follow every command got from its remote server. This configurable virus will additionally download arbitrary files and execute them for malicious reasons. Win32.Dofoil is closely connected to rogue security softwares (System Fix and other fake defragmenters), so make sure you remove it immediately. In … Continued

Win32:Malware-gen

Win32:Malware-gen (and Win64:Malware-gen) is a category for malicious but unspecified threats. Lots of files get detected by this name. It is difficult to say what harm a Win32:Malware-gen file might cause, only that it might be dangerous. As it’s a threat, it is important to remove the Win32:Malware-gen item and to find out how it got … Continued

“Windows Detected ZEUS Virus” scam

“Windows Detected ZEUS Virus” scam is most likely displayed by bad ads, a Trojan, or another malware parasite (like adware) currently affecting your operating system. This pop-up is categorized among other technical support scams like “Microsoft Error: Unknown System Failure” and “Microsoft Office Activation”. If this message locks access to your browser, you should not … Continued

‘Windows license locked!’

‘Windows license locked!’ is a fake pop-up which starts appearing on PC desktop as soon as Trojan spreading it gets inside the system. This bogus security alert begins its misleading campaign which is dedicated for making users believe that they have numerous problems with their security. Of course, as we know that ‘Windows license locked’ … Continued

Windows Malicious Software Removal Tool

Windows Malicious Software Removal Tool is yet another example of cyber criminals cashing in on Microsoft’s fame, only this particular scam is extremely blatant about it. There is an actual Microsoft application called Windows Malicious Software Removal Tool: this particular piece of software has been out for over 4 years now and it’s free. The program … Continued

XLoader Spyware

While iOS users are still worried about Pegasus, XLoader has emerged as a new threat to Apple devices. This spyware is an evolution of FormBook spyware. It’s able to steal login credentials (usernames, passwords), take screenshots, log keystrokes, and download and run files. XLoader attacks both Windows computers and Apple devices. It can steal information, force … Continued

XMRig Miner Trojan

XMRig (WaterMiner) Miner Trojan refers to a high performance Monero (XMR) miner with the official full Windows support. Currently, more and more miners are being created. One of the most recent ones is Crypto-Loot miner. The XMRig miner itself is created by respectable developers and people can start using it after obtaining the necessary binary … Continued

Your-mac-security-analysis.net

Your-mac-security-analysis.net is an address that might appear as you’re casually browsing the internet and bring some concerning news about your computer being infected. Though the page might look like it comes from the official Apple tech support service AppleCare (their logo is displayed on the page), Your-mac-security-analysis.net is actually made by some fraudsters to sell … Continued

“Your PC Ran Into a Problem” virus

VinCE 1.5 is a small application (about 30 KB) that security researchers have just recently discovered floating around the Internet. Even though such a tiny program can be regarded as insignificant, we advise you to not fall into this rabbit hole as it can lead you to flawed assumptions. In comparison to other media players, … Continued

Your Windos Has Been Banned Screenlocker

Your Windos Has Been Banned is the title of a recently detected screen-locker which blames victims for violations of terms of use. As a consequence, the offender’s device is to be blocked by Your Windos Has Been Banned and he/she won’t be allowed to fully launch the operating system. You can immediately notice a spelling … Continued

‘Your Windows Hasbeen Banned’ Screenlocker

‘Your Windows Hasbeen Banned’, also referred to as ‘Your Windows Has Been Banned’, is a relatively new screen locker, which appeared in November, 2016 (the first version). ‘Your Windows Hasbeen Banned’ is, actually, the first version of the screenlocker, while ‘Your Windows Has Been Banned’ is the second version (appeared on the 13th of December, … Continued

ZeroAccess Rootkit

ZeroAccess rootkit, also known as Max++, is a nasty piece of malware which is designed to start its persistent campaign just after infiltration. The infiltration of this malware is quite simple and done through security holes together with infected downloads, often Adobe Reader or Java fake updates. It can be said that additional purpose of … Continued

Zeus Trojan

Zeus Trojan is a very dangerous PC infection – it steals banking data and uses the infected computer’s resources to perform more crimes and cyberattacks. Although the original Zeus Trojan was retired in 2010, its code is still used in many modern variants. Zeus Trojan is also known as ZBot and works on Windows computers. … Continued

Recent Posts

Security Guides

Recent Comments