Track Global Malware Trends
View the trending of malware based on the 'detection count' reports of threats found in infected PCs and volume levels which reflect malware infection rates. For real-time data on malware outbreaks worldwide, visit MalwareTracker.
Top 10 Malware Threats
Rank Malware Infected PCs %Change Trend
1 Adware Helpers 1,099,600 0%
2 Conduit Search/Toolbar 875,439 0%
3 Adware.LinkSwift 630,029 0%
4 Qvo6.com Hijacker 608,359 0%
5 PUP.Optimizer Pro 554,232 0%
6 V9 Redirect Virus 536,791 0%
7 PUP.InstallCore 527,398 0%
8 PUP.SupTab 471,997 0%
9 Babylon Search/Toolbar 423,458 0%
10 WeDownload Manager 416,203 0%
csv
Download as CSV
More Info
i

Top Security News

Top 20 Countries Found to Have the Most Cybercrime
Have you ever wondered which countries face the most cybercrime? If you have ever wondered which countries have the most cybercrime, then you may be surprised to know that there are few contributing factors that attract cybercriminals to specific regions of the world. Security research firm,...
Gmail Filter Virus Attacks Gmail Users Turning Them Into Spammers
A new vulnerability within the Gmail email account system, called Gmail Filter Virus, is currently affecting some Gmail users taking control of their account turning it into a virtual spam proxy. Many Gmail account users will utilize the 'filters' feature for various automation functions in...
Crafty Scammers Offer a Fake Survey Bypassing Script That is Really a Survey Scam Campaign in Disguise
Just when you think that you have heard about some of the most clever scams online, cybercrooks amaze us all again as they introduce their very own solution to online survey scams. The people responsible for survey scams are not only still tricking computer users through the use of their annoying...

More Articles

VirLock Ransomware

Screenshot

The VirLock Ransomware is a ransomware Trojan that takes computers hostage and then demands payment from the computer users using BitCoin, a crypto-currency that is known for permitting anonymous online payments. The VirLock Ransomware will threaten computer users, claiming that the VirLock Ransomware has found pirated software on the infected computer and threatening to report the victim to the authorities unless the fine is paid. These claims have no basis. The VirLock Ransomware cannot check your computer for pirated software or alert the authorities. Rather, the VirLock Ransomware is engineered to lock down your computer and prevent access to your files. If the VirLock Ransomware...

Posted on December 10, 2014 in Ransomware

CryptoWall Ransomware

Screenshot

The CryptoWall Ransomware is a ransomware Trojan that carries the same strategy as a number of other encryption ransomware infections such as Cryptorbit Ransomware or CryptoLocker Ransomware . The CryptoWall Ransomware is designed to infect all versions of Windows, including Windows XP, Windows Vista, Windows 7 and Windows 8. As soon as the CryptoWall Ransomware infects a computer, the CryptoWall Ransomware uses the RSA2048 encryption to encrypt crucial files. Effectively, the CryptoWall Ransomware prevents computer users from accessing their data, which will be encrypted and out of reach. The CryptoWall Ransomware claims that it is necessary to pay $500 USD to recover the encrypted...

Posted on May 12, 2014 in Ransomware

CryptoLocker Ransomware

Screenshot

The CryptoLocker Trojan is a ransomware infection that encrypts the victim's files. CryptoLocker may typically be installed by another threat such as a Trojan downloader or a worm. Once CryptoLocker is installed, CryptoLocker will search for sensitive files on the victim's computer and encrypt them. Essentially, CryptoLocker takes the infected computer hostage by preventing access to any of the computer user's files. CryptoLocker then demands payment of a ransom to decrypt the infected files. CryptoLocker is quite harmful, and ESG security analysts strongly advise computer users to use an efficient, proven and updated anti-malware program to protect their computer from these types of...

Posted on September 11, 2013 in Ransomware

MyStart by Incredibar

Screenshot

MyStart is a browser hijacker that uses the MyStart by Incredibar toolbar and a browser hijacking component that forces its victims to visit the MyStart.Incredibar.com website. This website is a low-quality search engine that displays more advertisements than legitimate results. Even worse, several of MyStart's search results may lead computer users to websites containing malicious content. Although MyStart actually provides a supposed tool to remove this component from the victim's web browser, ESG security researchers recommend disregarding this component and instead removing MyStart with the help of a reputable anti-malware utility. MyStart can refer to both the low-quality...

Posted on July 31, 2012 in Adware

FBI Moneypak Ransomware

Screenshot

ESG security researchers have received reports of a ransomware infection, known as the FBI Moneypak ransomware, that targets computer users in the United States. The FBI Moneypak ransomware infection will claim that the victim's computer was involved in viewing child pornography and then demands payment of a 100 dollar 'fine' to be sent via MoneyPack. Of course, that a criminal charge as serious as child pornography would be punished with a mere 100 dollar fine is laughable. There is a reason for this, the FBI Moneypak ransomware is not really from the FBI. Rather, this message is actually part of a common malware scam. The FBI Moneypak ransomware scam will use a Winlocker, that is,...

Posted on June 25, 2012 in Ransomware

Ukash Virus

Screenshot

The so-called Ukash Virus is a ransomware Trojan that receives its name because Ukash Virus requires that its victims use Ukash (a legitimate money transfer service) to transfer the ransom funds. This dangerous Trojan infection is composed of a Winlocker component that basically blocks access to the infected computer system, disabling access to the infected computer system's desktop, Task Manager, command line, Registry Editor and other services and applications. There are countless variants of the Ukash Virus, designed to target various different countries in Europe and North America. ESG malware analysts strongly advise against paying the ransom that this malware infection tries to...

Posted on June 15, 2012 in Ransomware

Live Security Platinum

Screenshot

Live Security Platinum is one of the many fake security programs in the WinWebSec family of malware. Although ESG security researchers have been following the family of malware for several years, Live Security Platinum is a relatively new variant first detected in 2012. Because of this, it is pivotal to ensure that your security software is fully updated. Like most fake security programs, Live Security Platinum is designed to induce PC users to purchase a worthless 'full version' of Live Security Platinum. To do this, Live Security Platinum will try to scare the computer user with a variety of fake error messages, pop-up alerts from the Taskbar and a convincing fake scan of the...

Posted on June 1, 2012 in Rogue Anti-Spyware Program

DNS Changer

Screenshot

DNS Changer is a Trojan that is designed to force a computer system to use rogue DNS servers. Also, DNS Changer is being referred to as the Internet Doomsday Virus, Ghost Click Malware, DNS Changer Rootkit, DNS Changer Malware, DNS Changer Trojan, DNS Changer Virus, FBI DNS Changer or DNSChanger. A DNS Changer infection will typically have two steps, in order to reroute the infected computer’s traffic to these malicious DNS servers: A DNS Changer malware infection will change the infected computer system’s settings, in order to replace the DNS servers to rogue DNS servers belonging to hackers or online criminals. The DNS Changer malware infection will then try to...

Posted on November 25, 2011 in Trojans

Spice Nice Ads

Ads by Spice Nice may start appearing in your web browser after you install a free software bundle. Adware developers deploy Spice Nice as monetization platform that can display banners, pop-ups and ad panels in your web browser in order to generate pay-per-click revenue. You may notice the Spice Nice adware as an extension, a Browser Helper Object, an add-on or a plugin. Security researchers note that the Spice Nice adware can optimize its effectiveness by reading your browsing history and detecting your approximate geographical location in order to present you with custom-made advertisements that would provoke your attention. Moreover, the Spice Nice adware can use Flash cookies as well as session cookies to determine your preferred online resources and insert in-text hyperlinks to sponsored products and services. The ads by Spice Nice might spice up your web browser in favor of...

Posted on March 30, 2015 in Possibly Unwanted Program

SHover Zoomchip

The SHover Zoomchip application is deemed as adware by security researchers because it serves as a private marketing platform of adware developers. The SHover Zoomchip app travels incorporated with freeware setup files that most users install via the 'Typical' or 'Express option without fully aware of what is deployed on their PC. The SHover Zoomchip adware can appear in your web client and 'Programs and Features' module in 'Control Panel' in several forms. The SHover Zoomchip adware may present itself as an add-on, a plugin, a Browser Helper Object, a toolbar and an extension. The SHover Zoomchip adware can be instructed by its developers to inject banners, ad panels and pop-ups in your web browser during every online session of yours thanks to a registry key in Windows. Moreover, ads by adware are not considered safe, and SHover Zoomchip may display links to potentially harmful...

Posted on March 30, 2015 in Possibly Unwanted Program

Mavradoi

The Mavradoi malware falls in the category of trojan downloaders that hackers employ in sophisticated attacks. The Mavradoi trojan downloader serves as a tool to download other malware such as keyloggers, viruses, and worms. If you detect the Mavradoi trojan downloader on your PC, you might be facing several malware infections.Hackers can use the Mavradoi malware to steal you banking and social media credentials as well as steal your, video, text and image files. Additionally, keep in mind that the Mavradoi trojan downloader can be used to download ransomware on your PC and extort you for money in exchange for the retrieval of your data. Malware analysts point out that Mavradoi can integrate with Windows Explorer in order to manipulate your programs and can open port 80 that attackers may use to gain remote access to your PC. The Mavradoi trojan downloader can be found in corrupted...

Posted on March 30, 2015 in Trojan

Dafterdod

Malware researchers use the Dafterdod designation to specify a trojan used by hackers to conceal their activity on infected computers. The Dafterdod can be inserted in your system by trojan downloaders and may arrive as an attached file from spam emails. The Dafterdod trojan can place its files in the 'ProgramFiles' folder with names that will not raise suspicion in the user. The Dafterdod trojan is programmed to create an uninstaller that can erase traces from other malware and help hackers avoid detection. The operations of the Dafterdod trojan are facilitated by a BAT file that can be linked to a registry key which allows Dafterdod to be run at Windows boot-up. You should note that the Dafterdod trojan can connect to a remote server and install on your PC other malware, steal files, copy a digital certificate and record your geographical location. The Dafterdod trojan can perform a...

Posted on March 30, 2015 in Trojans

EasyCleanPro

The EasyCleanPro software may appeal to users by offering powerful optimization features with easy controls. EasyCleanPro is dispersed with the help of free software installers that most computer users prefer to handle via the 'Express' or 'Typical' option. Security experts warn that EasyCleanPro is perceived as a Potentially Unwanted Program (PUP) that does not perform as well as advertised and may use alerts of system errors to convince you to pay for a premium license. Moreover, users that wanted to uninstall EasyCleanPro report that its uninstaller is not functional, and they can't remove it manually. Security experts point out that EasyCleanPro can use numerous messages to suggest you to purchase an activation code for the full suite of its features. You may be interested to know that the primary goal of EasyCleanPro is to convince users to pay for system repairs that they might...

Posted on March 30, 2015 in Possibly Unwanted Program

Safer Browser

The Safer Browser program is classified by security analysts as a browser hijacker that prevents users and other applications from changing the online settings it applies to your PC. The Safer Browser app may change your home page, new tab and default search engine to use Native-search.com or another low-quality search aggregator. You should keep in mind that the Safer Browser application can be remotely instructed to modify the way web pages are presented to you and inject ads as a way to generate pay-per-click revenue for its developers. Browser hijackers such as Safer Browser restrict the user from accessing options of their web client and may redirect users to unsafe web locations. The Safer Browser tool is known to auto-start with Windows thanks to a registry key and infected users are notified with a pop-up during system boot-up that Safer Browser has enabled protection. In this...

Posted on March 30, 2015 in Adware

TabNav

The web surfers who like to sprint through search results on Google might be interested to install the TabNav browser instrument that claims to offer an online experience like you are on a tablet. Most computer users install the TabNav app as a drive-by installation of a freeware package via the 'Express' or 'Typical' option. However, the TabNav app by FlowSurf Apps is ad supported and your browsing history, entered URLs and search terms will be sold to advertisers that can use TabNav to display related ads in your web client. The developers of TabNav may offer it free of charge, but you will have to tolerate banners, ad boxes and in-text commercials from merchants. You should note that the TabNav program has versions for Internet Explorer, Mozilla Firefox and Google Chrome that can display ads across your installed web browsers. Keep in mind that every advertiser who has the money to...

Posted on March 30, 2015 in Adware

AP Suggestor

The AP Suggestor search assistant from APSolo LTD UK is classified by security experts as a Potentially Unwanted Program (PUP) because AP Suggestor tracks your search terms and displays advertisements in your web browser. You should note that the AP Suggestor app reads your entered search terms and presents you with similar keywords and suggestions linking to a video, text and image content. Web surfers who are concerned with their privacy may not want the AP Suggestor tool to be part of their web browser. If you like visiting peculiar adult rated content you might not want AP Suggestor to suggest similar content when your spouse or parents decide to use the web client after your online session. AP Suggestor is available for Internet Explorer as a Browser Helper Object (BHO) that uses a DLL file to facilitate its operations. You may be interested to know that the AP Suggestor app...

Posted on March 30, 2015 in Adware

Ski Search

The Ski Search browser tool can be promoted to you in freeware bundles as the best technology to browse the web. However, security researchers perceive Ski Search as a Potentially Unwanted Program (PUP) with adware capabilities because it sells information about you to merchants and advertisers. The Ski Search instrument may not please you with advanced search option, but it will display marketing materials in your web browser. You should note that the 'Terms of Use' and 'Privacy Agreement' of Ski Search states that it can utilize several tracking technologies. Ski Search can record your IP address, hardware and software configuration as well as use tracking cookies to help advertisers push targeted ads in your web browser. You may want to know that web surfers who installed the Ski Search app report pop-ups, banners and ad panels by Ski Search that appeared in their web browser....

Posted on March 30, 2015 in Adware

Trojan.Win32.FraudPack.xwe

The Trojan.Win32.FraudPack.xwe detection serves antivirus applications to specify a trojan infection part of the FraudPack family of malware. The Trojan.Win32.FraudPack.xwe trojan is associated with rogue applications and adware that are designed to be harder to remove manually. The Trojan.Win32.FraudPack.xwe may copy its files to several system locations such as the AppData, ProgramFiles and Temp folders. The Trojan.Win32.FraudPack.xwe detection may point to a TMP and EXE files that can host background services and process that allow rogueware and adware to work uninterrupted by the user or security applications. Also, DLL files could be detected as Trojan.Win32.FraudPack.xwe if they are modified to facilitate harmful operations. As mentioned before, Trojan.Win32.FraudPack.xwe is associated with adware and rogue software, and you may have automatically installed it with a free...

Posted on March 30, 2015 in Trojans

Water Plant Ads

The Water Plant browser instrument may claim that it will enhance your online experience, but you might want to know that its primary objective is to show ads. The Water Plant app is ad supported, and its developers can use it to collect information about you and sell it to advertisers. Therefore, security experts perceive Water Plant as a Potentially Unwanted Program (PUP) with adware capabilities. You may want to know that the Water Plant browser tool can record your IP address, your approximate geographical location, browsing habits and bookmarks. The information gathered by Water Plan can help marketing developers to push targeted commercials in your web browser in the form of banners, ad panels, pop-ups and transitional ads. Vendors can work with freeware developers in order to reach a greater number of potential buyers and construct better marketing strategies. Users may install...

Posted on March 30, 2015 in Possibly Unwanted Program

FastSaler

The FastSaler browser tool is advertised in freeware bundles as an instrument for online shoppers to discover amazing deals and cheap products. However, the only thing that is amazing about FastSaler is the amount of advertisements FastSaler can display in your web browser. Security experts classify the FastSaler browser tool as adware because it can use a Browser Helper Object, an extension, and an add-on to push marketing content. Users that were not careful and installed freeware via the 'Express' or 'Typical' option might experience ads by FastSaler in the form of banners, ad panels, coupons and special deals. Moreover, the FastSaler adware can read your browsing history and determine what type of commercials would suit your interests. Security experts remind users that advertisements delivered by adware may contain links to unsafe web locations and online resources. The primary...

Posted on March 27, 2015 in Adware

Asrv-a.akamaihd.net

The pop-up windows by Asrv-a.akamaihd.net in your web client may invite you to install the LightSpark Player, and a quick search on Google can show that it is a legitimate application. However, you should note that the LightSpark Player is a native Linux application, and its brand is used to invite users to install a potentially harmful software. The Asrv-a.akamaihd.net pop-up may appear on software centers with a bad reputation and users infected with adware may encounter it on most pages they visit. The Asrv-a.akamaihd.net domain is associated with adware that could be used by hackers to spread risk are. You may be interested to know that the Asrv-a.akamaihd.net adware might use a Browser Helper Object, an add-on, and a browser extension to push pop-up windows. Security experts note that adware developers can work with hackers to promote harmful programs. Also, you might wish to...

Posted on March 27, 2015 in Browser Hijackers

SpeedItUp

The SpeedItUp software by MicroSmarts LLC is advertised to speed up your PC by freeing up space and cleaning temporary files, but security experts perceive SpeedItUp as a Potentially Unwanted Program (PUP). The SpeedItUp app can be downloaded from its official website and is often encountered in freeware bundles as SpeedItUp Free and Speeditup-Checkup. Additionally, the SpeedItUp program is known to travel in the company of the CheckMeUp browser extension which is known to display pop-up windows by Consumer-feedback.net in the web browser. The interface of SpeedItUp does not offer much functionality, and it can employ a registry key to boot with Windows and delay the start of your OS. Computer users may want to seek alternatives of the SpeedItUp tool that are not bundled with adware and low-quality search assistants. Keep in mind that the publishers of SpeedItUp Free may update its...

Posted on March 27, 2015 in Potentially Unwanted Programs

Addresseslittlessexy.com

Computer users who are presented with a ransom note in Belarussian on the Addresseslittlessexy.com domain should be alerted that they are infected with malware. Security researchers linked the IP address 98.124.253.216 of Addresseslittlessexy.com to the Tufik virus that in this case was used to lock the victim's web browsers and display a ransom note. The note on Addresseslittlessexy.com suggests that the Ministry of Internal Affairs of Belarus have detected unlawful activity and in order to evade legal prosecution the users should pay a fee within 12 hours. Malware researchers point out that the Tufik virus linked to Addresseslittlessexy.com can corrupt your web browsers and prevent you from accessing other pages, and that may convince some users that a government agency is enforcing law regulations. The Tufik virus is deployed as an EXE file and can modify your Windows system files...

Posted on March 27, 2015 in Browser Hijackers
1  2  3  4  5  6  7  8  9  10  11  12  Next     Total items: 13477