Track Global Malware Trends
View the trending of malware based on the 'detection count' reports of threats found in infected PCs and volume levels which reflect malware infection rates. For real-time data on malware outbreaks worldwide, visit MalwareTracker.
Top 10 Malware Threats
Rank Malware Infected PCs %Change Trend
1 Adware Helpers 2,111,252 -1%
2 Conduit Search/Toolbar 1,542,556 -1%
3 PUP.SupTab 1,143,028 -1%
4 PUP.InstallCore 951,654 -1%
5 PUP.SuperWeb 937,776 -2%
6 Adware.Multiplug/Variant 925,805 0%
7 PUP.Optimizer Pro 924,794 -1%
8 Iminent Toolbar 764,638 -1%
9 PUP.CrossRider 666,660 -2%
csv
Download as CSV
More Info
i

Top Security News

Top 20 Countries Found to Have the Most Cybercrime
Have you ever wondered which countries face the most cybercrime? If you have ever wondered which countries have the most cybercrime, then you may be surprised to know that there are few contributing factors that attract cybercriminals to specific regions of the world. Security research firm,...
Gmail Filter Virus Attacks Gmail Users Turning Them Into Spammers
A new vulnerability within the Gmail email account system, called Gmail Filter Virus, is currently affecting some Gmail users taking control of their account turning it into a virtual spam proxy. Many Gmail account users will utilize the 'filters' feature for various automation functions in...
Crafty Scammers Offer a Fake Survey Bypassing Script That is Really a Survey Scam Campaign in Disguise
Just when you think that you have heard about some of the most clever scams online, cybercrooks amaze us all again as they introduce their very own solution to online survey scams. The people responsible for survey scams are not only still tricking computer users through the use of their annoying...

More Articles

VirLock Ransomware

Screenshot

The VirLock Ransomware is a ransomware Trojan that takes computers hostage and then demands payment from the computer users using BitCoin, a crypto-currency that is known for permitting anonymous online payments. The VirLock Ransomware will threaten computer users, claiming that the VirLock Ransomware has found pirated software on the infected computer and threatening to report the victim to the authorities unless the fine is paid. These claims have no basis. The VirLock Ransomware cannot check your computer for pirated software or alert the authorities. Rather, the VirLock Ransomware is engineered to lock down your computer and prevent access to your files. If the VirLock Ransomware...

Posted on December 10, 2014 in Ransomware

CryptoWall Ransomware

Screenshot

The CryptoWall Ransomware is a ransomware Trojan that carries the same strategy as a number of other encryption ransomware infections such as Cryptorbit Ransomware or CryptoLocker Ransomware . The CryptoWall Ransomware is designed to infect all versions of Windows, including Windows XP, Windows Vista, Windows 7 and Windows 8. As soon as the CryptoWall Ransomware infects a computer, the CryptoWall Ransomware uses the RSA2048 encryption to encrypt crucial files. Effectively, the CryptoWall Ransomware prevents computer users from accessing their data, which will be encrypted and out of reach. The CryptoWall Ransomware claims that it is necessary to pay $500 USD to recover the encrypted...

Posted on May 12, 2014 in Ransomware

CryptoLocker Ransomware

Screenshot

The CryptoLocker Trojan is a ransomware infection that encrypts the victim's files. CryptoLocker may typically be installed by another threat such as a Trojan downloader or a worm. Once CryptoLocker is installed, CryptoLocker will search for sensitive files on the victim's computer and encrypt them. Essentially, CryptoLocker takes the infected computer hostage by preventing access to any of the computer user's files. CryptoLocker then demands payment of a ransom to decrypt the infected files. CryptoLocker is quite harmful, and ESG security analysts strongly advise computer users to use an efficient, proven and updated anti-malware program to protect their computer from these types of...

Posted on September 11, 2013 in Ransomware

MyStart by Incredibar

Screenshot

MyStart is a browser hijacker that uses the MyStart by Incredibar toolbar and a browser hijacking component that forces its victims to visit the MyStart.Incredibar.com website. This website is a low-quality search engine that displays more advertisements than legitimate results. Even worse, several of MyStart's search results may lead computer users to websites containing malicious content. Although MyStart actually provides a supposed tool to remove this component from the victim's web browser, ESG security researchers recommend disregarding this component and instead removing MyStart with the help of a reputable anti-malware utility. MyStart can refer to both the low-quality...

Posted on July 31, 2012 in Adware

FBI Moneypak Ransomware

Screenshot

ESG security researchers have received reports of a ransomware infection, known as the FBI Moneypak ransomware, that targets computer users in the United States. The FBI Moneypak ransomware infection will claim that the victim's computer was involved in viewing child pornography and then demands payment of a 100 dollar 'fine' to be sent via MoneyPack. Of course, that a criminal charge as serious as child pornography would be punished with a mere 100 dollar fine is laughable. There is a reason for this, the FBI Moneypak ransomware is not really from the FBI. Rather, this message is actually part of a common malware scam. The FBI Moneypak ransomware scam will use a Winlocker, that is,...

Posted on June 25, 2012 in Ransomware

Ukash Virus

Screenshot

The so-called Ukash Virus is a ransomware Trojan that receives its name because Ukash Virus requires that its victims use Ukash (a legitimate money transfer service) to transfer the ransom funds. This dangerous Trojan infection is composed of a Winlocker component that basically blocks access to the infected computer system, disabling access to the infected computer system's desktop, Task Manager, command line, Registry Editor and other services and applications. There are countless variants of the Ukash Virus, designed to target various different countries in Europe and North America. ESG malware analysts strongly advise against paying the ransom that this malware infection tries to...

Posted on June 15, 2012 in Ransomware

Live Security Platinum

Screenshot

Live Security Platinum is one of the many fake security programs in the WinWebSec family of malware. Although ESG security researchers have been following the family of malware for several years, Live Security Platinum is a relatively new variant first detected in 2012. Because of this, it is pivotal to ensure that your security software is fully updated. Like most fake security programs, Live Security Platinum is designed to induce PC users to purchase a worthless 'full version' of Live Security Platinum. To do this, Live Security Platinum will try to scare the computer user with a variety of fake error messages, pop-up alerts from the Taskbar and a convincing fake scan of the...

Posted on June 1, 2012 in Rogue Anti-Spyware Program

DNS Changer

Screenshot

DNS Changer is a Trojan that is designed to force a computer system to use rogue DNS servers. Also, DNS Changer is being referred to as the Internet Doomsday Virus, Ghost Click Malware, DNS Changer Rootkit, DNS Changer Malware, DNS Changer Trojan, DNS Changer Virus, FBI DNS Changer or DNSChanger. A DNS Changer infection will typically have two steps, in order to reroute the infected computer’s traffic to these malicious DNS servers: A DNS Changer malware infection will change the infected computer system’s settings, in order to replace the DNS servers to rogue DNS servers belonging to hackers or online criminals. The DNS Changer malware infection will then try to...

Posted on November 25, 2011 in Trojans

EmailDescontos

The EmailDescontos shopping assistant may offer users to notify them of new coupons and discounts by email and browser notifications, but you should not provide your contact details and avoid installing it. Security researchers alert users that the EmailDescontos shopping assistant is adware that is designed to earn pay-per-click revenue for its developers by piling ads on your browser surface. The EmailDescontos adware has versions for all major web browsers that travel incorporated with free program installers to reach as many users as possible. You should keep in mind that security researchers do not perceive the ads by adware like EmailDescontos as safe, and you might be redirected to harmful websites. Additionally, the EmailDescontos adware may promote rogue software like RegistryPowerCleaner and Active Antivir that may cause critical errors and expose your system to advanced...

Posted on June 30, 2015 in Adware

Lucky-visitor.org

The Lucky-visitor.org pop-up windows that appear while you surf the Internet may claim that you are a lucky visitor, but you may want to know that you are infected with adware. The adware associated with Lucky-visitor.org is used by third parties to earn revenue from users completing surveys. The Lucky-visitor.org pop-up windows may feature links to phishing websites where users are invited to input their login details for social media. The 166.62.28.85 IP address of the Lucky-visitor.org domain is detected in communications of compromised servers, and you should not follow links on the Lucky-visitor.org pop-up windows. Moreover, the adware associated with Lucky-visitor.org may use tracking cookies and read your browsing history to present you with related surveys. Security experts note that the prizes on Lucky-visitor.org are bogus and are used to convince users to stay on...

Posted on June 30, 2015 in Adware

Bigprizezone.[RANDOM NUMBERS].inf

The bigprizezone.[RANDOM NUMBERS].inf pop-ups may suggest that you are a lucky visitor that has the chance to win a high-end phone after completing a short survey. However, you should not trust them because they are generated by adware on your computer that may have arrived with a free program that you installed with the 'Express' or 'Typical' option. Security experts note that the bigprizezone.[RANDOM NUMBERS].inf pop-up windows in your web browser may link to many subdomains of Bigprizezone.inf. The prizes that are promised on the bigprizezone.[RANDOM NUMBERS].inf pop-ups are not real, and adware developers are only after your clicks. The bigprizezone.[RANDOM NUMBERS].inf adware generates affiliate revenue for its creators while your attention is focused on the content provided on the bigprizezone.[RANDOM NUMBERS].inf pop-up windows. Moreover, the bigprizezone.[RANDOM NUMBERS].inf...

Posted on June 30, 2015 in Adware

DeleteAd

The DeleteAd browser tool from WebPick Internet Holdings Ltd. may be offered to you as a secure way to block ads when you explore the 'Custom' or 'Advanced' option of a freeware installer. You may want to know that the DeleteAd browser tool is supported by advertisers, and it may block the native ads on websites you visit, but it will display ads by its sponsors. The DeleteAd browser tool functions similarly to other WebPick products such as Mini-Adblocker and Supreme AdBlocker that are known to feature ads by sponsors. Security analysts classify the DeleteAd browser tool as adware because it claims to delete ads, but in reality it shows ads from supported advertisers. Users infected with the DeleteAd adware may be offered to install additional adware such as GetDiscountApp to access marketing offers from supposedly trusted partners. Moreover, all of WebPick's products are known...

Posted on June 30, 2015 in Adware

[RANDOM WORDS].akamaihd.net

The [RANDOM WORDS].akamaihd.net detection is used by security applications to specify a browser hijacker infection that changes its connection to subdomains of Akamihd.net and is deployed embedded with freeware bundles. The [RANDOM WORDS].akamaihd.net browser hijacker is designed to show pop-up windows in your Internet client and change your homepage in order to present users with fake updates to the Java and Adobe Flash software as often as possible. The legitimate Java and Adobe Flash programs have built-in update managers and will not use your browser to notify users of updates. You might want to know that the [RANDOM WORDS].akamaihd.net pop-up windows may promote apps such as VeeHD and Video Dimmer under the logo of legitimate programs. There are cases where browser hijackers such as the one associated with [RANDOM WORDS].akamaihd.net promote rogue software like Driver...

Posted on June 30, 2015 in Browser Hijackers

Systemholdings.com

Security researchers alert users that the 'Spyware virus may have infected your operating system' message on the Systemholdings.com pop-ups is caused by adware on your computer. The Systemholdings.com pop-ups may be facilitated by an adware-powered browser extension that was installed along with a free application via the 'Express' or 'Typical' option. The Systemholdings.com adware may write a registry entry in Windows to run at boot-up and open a tab in your browser to show messages on Systemholdings.com. Moreover, users infected with adware may be presented with pop-ups by Breakthroughit.info that link back to the Systemholdings.com domain. Both domains are used by adware developers to scare users with pop-up windows that closely resemble the BSoD screens that the Windows OS generates in case of a critical system error. Security researchers remind users that the BSoD messages on...

Posted on June 29, 2015 in Adware

Zfinainex.info

The Zfinainex.info domain is utilized by adware developers who strive to earn pay-per-per-install revenue by spreading riskware such as Reimage and OneClick under the logo of Adobe Flash. Users who carelessly install free programs via the 'Express' or 'Typical;' option often allow adware to enter their OS as well. The adware in question shows pop-up windows by Zfinainex.info in your web browser and promotes the 'Flash Player Pro' software. The Zfinainex.info pop-ups may use a slightly modified Adobe Flash logo to invite users to install the promoted program. However, you should avoid the installation of programs from Zfinainex.info because they may contain rogue programs like PC Optimizer Pro and SpeedMaxPC that may cause critical system errors. The adware associated with Zfinainex.info may change your homepage and load pop-up windows by Zfinainex.info every time you visit...

Posted on June 29, 2015 in Adware

Great Find Ads

The Great Find browser extension has an official website, but it does not provide much information. Users can't find information on what it does and will find a vague 'Terms of Use' agreement that does not mention who created the Great Find extension. These facts should provide enough reason for users to abstain from installing the Great Find browser extension that can be found in freeware packages under the 'Advanced' or 'Custom' option. Security experts classify the Great Find browser extension as adware because its code is dedicated to showing ads in your browser. The Great Find adware may use ad boxes, inline ads, pop-ups, and pop-unders to deliver advertising content and generate affiliate marketing revenue for its creators. The Great Find adware may use DOM storage data to record your typed URLs and read your browsing and download history to customize the promotions it displays....

Posted on June 29, 2015 in Adware

Viruskillers.co

Scammers use the Viruskillers.co domain in partnership with adware developers to scare users with fake security alerts that their system is compromised and need to call 800-410-1075 to receive help. You may want to know that the 800-410-1075 phone number is used in several other scams linked to Windows-crash-report.info and Norton.security.info . Users are strongly advised against calling the 800-410-1075 phone number listed on the Viruskillers.co domain. The Viruskillers.co pop-up windows in your browser are generated by adware that may have arrived along with a free application installer that most users handle with the 'Express' or 'Typical' option. The Viruskillers.co pop-ups may feature logos from security authorities to claim credibility, but you should not trust messages displayed by adware. The Viruskillers.co adware may use an executable DLL file and a browser extension to...

Posted on June 29, 2015 in Adware

Win32/Application.IM.d29

The Win32/Application.IM.d29 detection refers to a trojan infection that may appear as an application for 32-bit Windows systems. Security analysts alert users that the Win32/Application.IM.d29 trojan may be distributed via freeware bundles on suspicious web sites and as an attached file to spam emails. Also, the binary of Win32/Application.IM.d29 could be located on your Windows partition under the Programs Files directory. However, the trojan associated with Win32/Application.IM.d29 can hide its files by writing the tag 'Hidden' in the properties of its components. That way it may bypass security scans and performs its operations uninterrupted. Moreover, the Win32/Application.IM.d29 trojan may record your keystrokes and connect to remote 'Command and Control' servers to supply its operators with information like your IP address, OS version, installed programs and log-in credentials....

Posted on June 29, 2015 in Trojans

Erot.co

The Erot.co website is dedicated to adult content, and many users may not want it as their homepage. However, users who install freeware via the 'Express' or 'Typical' option could allow a browser hijacker associated with Erot.co to enter their system. The Erot.co browser hijacker may change your homepage, new tab and show ads by Erot.co that redirect users to various sections of the website that may feature a disturbing content. Additionally, the Erot.co browser hijacker might show pop-up and pop-under windows as you surf the web and parents should not let minors use a computer infected with the Erot.co browser hijacker. The hijacker in question may appear as a browser plug-in and may affect Google Chrome, Mozilla Firefox, and Internet Explorer. The Erot.co browser hijacker may prove hard for manual removal because browser hijackers often write registry entries in Windows to protect...

Posted on June 29, 2015 in Browser Hijackers

Trojan.Multi.TaskRun.a

The Trojan.Multi.TaskRun.A detection is used by security applications to alarm users of programs that run as several separate processes and could be trojans in disguise. Security experts note that the Trojan.Multi.TaskRun.A security alert can be triggered by legitimate programs that use several processes to host the operations of their separate modules. For example, Google Chrome uses sandboxing to host every tab you open in a separate process and protect your system from attacks on harmful domains and ensure the stability of your browser. However, users should stay vigilant and when you are presented with the Trojan.Multi.TaskRun.A security alert you could open your Windows Task Manager and check for suspicious processes and services. There are cases where the Trojan.Multi.TaskRun.A notification is triggered by trojans that attach third-party code to programs opened by the users and...

Posted on June 29, 2015 in Trojans

Fresh Outlook

The Fresh Outlook software that is advertised on the FreshOutlook.com website and freeware bundles to make your searches on Google enjoyable is deemed as a Potentially Unwanted Program (PUP) with adware capabilities. Security researchers note that the primary objective of the Fresh Outlook program is to show ads and upon installation it ensure that its update manager will not need your approval to download and install patches and improvements. The developers of Fresh Outlook do not mention how it will make your searches more enjoyable but make sure that you know that the Fresh Outlook product is supported by advertisements. Users who installed the Fresh Outlook program should expect to see pop-up windows with video ads, in-text hyperlinks to sponsors, banners and pop-under windows loaded with marketing content related to the page you are visiting. Moreover, the Fresh Outlook program...

Posted on June 26, 2015 in Possibly Unwanted Program

Browser Secure

The Browser Secure is promoted as a reliable browser add-on that can help you avoid harmful websites and secure your online searches on Google and Bing. You may be interested to know that the developers of Browser Secure say that it is meant to be helpful, but its primary directive is to show ads. The Browser Secure add-on may block some harmful links and provide you with limited protection while you are provided with numerous promotional materials and sponsored links. The Browser Secure add-on is perceived by security analysts as a Potentially Unwanted Program (PUP) with adware functionality that may change your default search provider and homepage to direct web traffic to sponsored services. You may want to know that the Browser Secure add-on records your entered search terms and URLs to customize the marketing content displayed in your web browser. The Browser Secure program can...

Posted on June 26, 2015 in Possibly Unwanted Program

My Coupons XP

The My Coupons XP shopping tool can be found in freeware packages as an additional offer. The My Coupons XP software claims to offer a suite of enhancements for your browser that will enable you to search for interesting coupons and deals via a customized search engine on Search.MyCouponsXP.com. You should note that it is an ad-supported program and should expect to see many ads. Security researchers perceive the My Coupons XP shopping tool as a Potentially Unwanted Program (PUP) with adware capabilities. My Coupons XP may cover your browser surface with commercials and change your default home page, new tab and search provider. As stated before, the My Coupons XP tool is supported by ads, and you may experience occasional redirects to sponsored resources as well as notice banners and floating ad boxes with the slogan 'Ads by My Coupons XP'. The My Coupons XP tool may suggest you to...

Posted on June 26, 2015 in Possibly Unwanted Program
1 2 3 4 5 6 7 8 9 10 11 941