Track Global Malware Trends
View the trending of malware based on the 'detection count' reports of threats found in infected PCs and volume levels which reflect malware infection rates. For real-time data on malware outbreaks worldwide, visit MalwareTracker.
Top 10 Malware Threats
Rank Malware Infected PCs %Change Trend
1 Adware Helpers 1,099,600 0%
2 Conduit Search/Toolbar 875,439 0%
3 Adware.LinkSwift 630,029 0%
4 Qvo6.com Hijacker 608,359 0%
5 PUP.Optimizer Pro 554,232 0%
6 V9 Redirect Virus 536,791 0%
7 PUP.InstallCore 527,398 0%
8 PUP.SupTab 471,997 0%
9 Babylon Search/Toolbar 423,458 0%
10 WeDownload Manager 416,203 0%
csv
Download as CSV
More Info
i

Top Security News

Top 20 Countries Found to Have the Most Cybercrime
Have you ever wondered which countries face the most cybercrime? If you have ever wondered which countries have the most cybercrime, then you may be surprised to know that there are few contributing factors that attract cybercriminals to specific regions of the world. Security research firm,...
Gmail Filter Virus Attacks Gmail Users Turning Them Into Spammers
A new vulnerability within the Gmail email account system, called Gmail Filter Virus, is currently affecting some Gmail users taking control of their account turning it into a virtual spam proxy. Many Gmail account users will utilize the 'filters' feature for various automation functions in...
Crafty Scammers Offer a Fake Survey Bypassing Script That is Really a Survey Scam Campaign in Disguise
Just when you think that you have heard about some of the most clever scams online, cybercrooks amaze us all again as they introduce their very own solution to online survey scams. The people responsible for survey scams are not only still tricking computer users through the use of their annoying...

More Articles

VirLock Ransomware

Screenshot

The VirLock Ransomware is a ransomware Trojan that takes computers hostage and then demands payment from the computer users using BitCoin, a crypto-currency that is known for permitting anonymous online payments. The VirLock Ransomware will threaten computer users, claiming that the VirLock Ransomware has found pirated software on the infected computer and threatening to report the victim to the authorities unless the fine is paid. These claims have no basis. The VirLock Ransomware cannot check your computer for pirated software or alert the authorities. Rather, the VirLock Ransomware is engineered to lock down your computer and prevent access to your files. If the VirLock Ransomware...

Posted on December 10, 2014 in Ransomware

CryptoWall Ransomware

Screenshot

The CryptoWall Ransomware is a ransomware Trojan that carries the same strategy as a number of other encryption ransomware infections such as Cryptorbit Ransomware or CryptoLocker Ransomware . The CryptoWall Ransomware is designed to infect all versions of Windows, including Windows XP, Windows Vista, Windows 7 and Windows 8. As soon as the CryptoWall Ransomware infects a computer, the CryptoWall Ransomware uses the RSA2048 encryption to encrypt crucial files. Effectively, the CryptoWall Ransomware prevents computer users from accessing their data, which will be encrypted and out of reach. The CryptoWall Ransomware claims that it is necessary to pay $500 USD to recover the encrypted...

Posted on May 12, 2014 in Ransomware

CryptoLocker Ransomware

Screenshot

The CryptoLocker Trojan is a ransomware infection that encrypts the victim's files. CryptoLocker may typically be installed by another threat such as a Trojan downloader or a worm. Once CryptoLocker is installed, CryptoLocker will search for sensitive files on the victim's computer and encrypt them. Essentially, CryptoLocker takes the infected computer hostage by preventing access to any of the computer user's files. CryptoLocker then demands payment of a ransom to decrypt the infected files. CryptoLocker is quite harmful, and ESG security analysts strongly advise computer users to use an efficient, proven and updated anti-malware program to protect their computer from these types of...

Posted on September 11, 2013 in Ransomware

MyStart by Incredibar

Screenshot

MyStart is a browser hijacker that uses the MyStart by Incredibar toolbar and a browser hijacking component that forces its victims to visit the MyStart.Incredibar.com website. This website is a low-quality search engine that displays more advertisements than legitimate results. Even worse, several of MyStart's search results may lead computer users to websites containing malicious content. Although MyStart actually provides a supposed tool to remove this component from the victim's web browser, ESG security researchers recommend disregarding this component and instead removing MyStart with the help of a reputable anti-malware utility. MyStart can refer to both the low-quality...

Posted on July 31, 2012 in Adware

FBI Moneypak Ransomware

Screenshot

ESG security researchers have received reports of a ransomware infection, known as the FBI Moneypak ransomware, that targets computer users in the United States. The FBI Moneypak ransomware infection will claim that the victim's computer was involved in viewing child pornography and then demands payment of a 100 dollar 'fine' to be sent via MoneyPack. Of course, that a criminal charge as serious as child pornography would be punished with a mere 100 dollar fine is laughable. There is a reason for this, the FBI Moneypak ransomware is not really from the FBI. Rather, this message is actually part of a common malware scam. The FBI Moneypak ransomware scam will use a Winlocker, that is,...

Posted on June 25, 2012 in Ransomware

Ukash Virus

Screenshot

The so-called Ukash Virus is a ransomware Trojan that receives its name because Ukash Virus requires that its victims use Ukash (a legitimate money transfer service) to transfer the ransom funds. This dangerous Trojan infection is composed of a Winlocker component that basically blocks access to the infected computer system, disabling access to the infected computer system's desktop, Task Manager, command line, Registry Editor and other services and applications. There are countless variants of the Ukash Virus, designed to target various different countries in Europe and North America. ESG malware analysts strongly advise against paying the ransom that this malware infection tries to...

Posted on June 15, 2012 in Ransomware

Live Security Platinum

Screenshot

Live Security Platinum is one of the many fake security programs in the WinWebSec family of malware. Although ESG security researchers have been following the family of malware for several years, Live Security Platinum is a relatively new variant first detected in 2012. Because of this, it is pivotal to ensure that your security software is fully updated. Like most fake security programs, Live Security Platinum is designed to induce PC users to purchase a worthless 'full version' of Live Security Platinum. To do this, Live Security Platinum will try to scare the computer user with a variety of fake error messages, pop-up alerts from the Taskbar and a convincing fake scan of the...

Posted on June 1, 2012 in Rogue Anti-Spyware Program

DNS Changer

Screenshot

DNS Changer is a Trojan that is designed to force a computer system to use rogue DNS servers. Also, DNS Changer is being referred to as the Internet Doomsday Virus, Ghost Click Malware, DNS Changer Rootkit, DNS Changer Malware, DNS Changer Trojan, DNS Changer Virus, FBI DNS Changer or DNSChanger. A DNS Changer infection will typically have two steps, in order to reroute the infected computer’s traffic to these malicious DNS servers: A DNS Changer malware infection will change the infected computer system’s settings, in order to replace the DNS servers to rogue DNS servers belonging to hackers or online criminals. The DNS Changer malware infection will then try to...

Posted on November 25, 2011 in Trojans

Win32/TrojanDropper.Agent.PNP

Computers with inadequate protections may get infected by a harmful threat called Win32/TrojanDropper.Agent.PNP. Once installed on a computer, Win32/TrojanDropper.Agent.PNP will make changes to the Windows Registry, which will affect any Web browser used by the computer user, including Mozilla Firefox, Internet Explorer and Google Chrome. Win32/TrojanDropper.Agent.PNP may insert its corrupted files on the PC system through a backdoor Win32/TrojanDropper.Agent.PNP opens in order to facilitate the execution of its damaging actions. Win32/TrojanDropper.Agent.PNP also may disable your installed programs especially the ones focused on the PC security. Win32/TrojanDropper.Agent.PNP can collect account details such as password and user names, credit card and online banking information and more. Win32/TrojanDropper.Agent.PNP may install supplementary threats on the infected computer. It is...

Posted on March 30, 2015 in Trojans

Sad Cloud

Sad Cloud, another creation of Super Web LLC, is detected and regarded as a Potentially Unwanted Program developed to distribute itself via bundling marketing techniques or as a result of visiting unreliable webpages. After installation, this PUP starts making changes that later lead to slower performance of the machine and application crashes. Sad Cloud might also display bogus messages claiming that you need to update a program. Sad Cloud might also inject your browsers with annoying advertisements that may disrupt your normal Web browsing. Furthermore, Sad Cloud may collect your browsing preferences and send the information to third parties that may use it for marketing purposes.

Posted on March 30, 2015 in Potentially Unwanted Programs

Ladivyrop.A

Ladivyrop.A, also detected as TrojanDownloader:Win32/Ladivyrop.A and Trojan.Win32.Badur.admbp, is a threat that if installed on a computer may cause numerous, damaging problems to the infected machine. After invading a computer, Ladivyrop.A will run some commands automatically, consume a huge amount of resources, slow down the machine's speed significantly and install additional extensions and even threats. Ladivyrop.A targets computers running the Windows operating system. The installed firewall and security programs will be disabled by Ladivyrop.A. Ladivyrop.A also displays fake update messages and tons of unwanted advertisements that, if clicked, may bring with them PUPs, adware and similar content or redirect to potentially threatening websites. By registering the computer user browsing actions, Ladivyrop.A may collect information that will be shared with third parties. As a bonus...

Posted on March 30, 2015 in Trojans

Yappyz

Yappyz is a Potentially Unwanted Program (PUP) developed by a company called SIEN that has adware functionalities, may install browser add-ons or extensions and has additional purposes. Yappyz is not a virus, but its presence may involve various problematic features, such as browser hijacking or just disturb the Web user's experience. Yappyz infiltrates into the contaminated PC packaged with freeware and shareware programs (video recording/streaming, download managers or PDF creators). Computer users affected by Yappyz will notice countless sponsored advertisements over the Web page they are visiting, no matter if they are using Internet Explorer, Google Chrome or Mozilla Firefox. Yappyz's is advertised as a gaming provider for free games and its interface displays favored games, puzzles and similar content in order to attract the computer user into buying these products from its...

Posted on March 30, 2015 in Adware

Shop Easy Ads

Shop Easy is a Potentially Unwanted Program (PUP) linked to adware that may be installed on the targeted computer automatically. Shop Easy may enter the targeted computer bundled with freeware and shareware applications. Google Chrome, Mozilla Firefox and Internet Explorer are examples of Web browsers that may be affected by Shop Easy. Once installed on the compromised machine, Shop Easy may change the computer settings and may interrupt the PC user's browsing activities. Shop Easy may make numerous, disturbing advertisements appear once a Web browser is opened and result in forced redirections to unrelated websites. Although some computer users may install Shop Easy voluntarily thinking that Shop Easy will help them, they may, very soon, conclude that Shop Easy is not the kind of application that should be kept on their machines

Posted on March 30, 2015 in Adware

Appimaker

Appimaker is a free adware application that advertises itself as an instrument to improve the computer user's Web browsing and save money and time by displaying discount coupons, sales, offers and deals. Appimaker may display unwanted advertisements, messages and banners in a form of a pop-up box, which may include a variety of deals and offers based on the PC users' search queries when they are browsing the Web. Appimaker may insert a browser add-on, plug-in or browser extension onto all well-known Web browsers incorporating Internet Explorer, Google Chrome and Mozilla Firefox installed on the computer system. Appimaker may constantly redirect PC users to unreliable websites that may produce and show annoying pop-up advertisements and attempt to generate advertising income from increased traffic of affiliated websites and clicks on online advertisements.

Posted on March 30, 2015 in Adware

Assist Point Ads

Assist Point is categorized as a Potentially Unwanted Program (PUP) by security experts. Assist Point usually spreads and enters a PC bundled with other freeware. After installation, Assist Point may offer various deals and discounts on products shopped for over the Internet. The different deals offered through the Assist Point advertisements may lead you to other pages that your Web browser automatically redirects you to if the Assist Point advertisements are clicked on. Some of those sites may be filled with additional coupon deals or offers. Assist Point may also reduce the performance of your machine, making it cumbersome or difficult to view some Web pages at full speed. The various pop-ups or banners of Assist Point may be displayed at random while surfing the Internet, potentially interrupting your browsing. Removal of Assist Point may require the detection and removal of all...

Posted on March 30, 2015 in Possibly Unwanted Program

Plain Savings Ads

Plain Savings is adware and a potentially unwanted browser add-on that promises to facilitate a computer user's Internet surfing by showing discount coupons, best deals and similar content. Plain Savings may be installed in Internet Explorer, Google Chrome and Mozilla Firefox Web browsers automatically through the use of tricky strategies. Plain Savings may typically proliferate and access a computer packaged with free programs. When installed, Plain Savings may create and show random pop-up advertisements, messages and banners related to the computer user's browsing routine because Plain Savings may be able to trace the PC user's Internet surfing habits. Security experts suggest the removal of Plain Savings from an affected computer.

Posted on March 30, 2015 in Adware

Chart Choosing Ads

Computer users that try to keep their machines always well protected by security tools may be surprised by a large amount of advertisements displayed by an adware-laced program called Chart Choosing. Adware-laced programs such as Chart Choosing may enter a computer bundled with freeware. Chart Choosing is considered an adware due to several issues may create on an affected machine. These issues may include slow performance, monitoring browsing details, redirecting the PC user to compromised websites and more. Chart Choosing should be removed from the affected computer with a malware remover tool.

Posted on March 30, 2015 in Adware

Blue Bulletin Ads

Blue Bulletin is a browser extension compatible with Internet Explorer, Mozilla Firefox and Google Chrome. When installed on a computer, the adware behind Blue Bulletin may cause the appearance of disturbing and unwanted advertisements that will cover any visited Web page. Blue Bulletin is rated as a Possibly Unwanted program by security experts because Blue Bulletin may cause several problems on affected computers. These problems may include monitoring the computer users browsing actions and collecting information that may be used by third parties and diminishing the machine's performance and speed. Also, by clicking the advertisements displayed by Blue Bulletin, the computer user may be directed to websites with threatening content. Since Blue Bulletin may have entered the computer bundled with a third-party free program downloaded by the computer user, it's very important to be...

Posted on March 30, 2015 in Possibly Unwanted Program

Servizi.rossoalice.alice.it

Servizi.rossoalice.alice.it is associated with a browser hijacker. A browser hijacker is pushed by other free software (PDF creators, download managers or video recording/streaming) that had it bundled into their installation. When the PC user downloads a specific product from websites like Servizi.rossoalice.alice.it, it might have also installed PC threats during the software product setup process. After a successful installation, the browser hijacker will substitute the default homepage with Servizi.rossoalice.alice.it, display unwanted pop-up advertisements and sponsored links in search results of any search tool and may snatch search terms from the victim's search queries. Servizi.rossoalice.alice.it is used to raise Web traffic and benefit fits creators through the pay-per-click technique.

Posted on March 30, 2015 in Browser Hijackers

Spice Nice Ads

Ads by Spice Nice may start appearing in your web browser after you install a free software bundle. Adware developers deploy Spice Nice as monetization platform that can display banners, pop-ups and ad panels in your web browser in order to generate pay-per-click revenue. You may notice the Spice Nice adware as an extension, a Browser Helper Object, an add-on or a plugin. Security researchers note that the Spice Nice adware can optimize its effectiveness by reading your browsing history and detecting your approximate geographical location in order to present you with custom-made advertisements that would provoke your attention. Moreover, the Spice Nice adware can use Flash cookies as well as session cookies to determine your preferred online resources and insert in-text hyperlinks to sponsored products and services. The ads by Spice Nice might spice up your web browser in favor of...

Posted on March 30, 2015 in Possibly Unwanted Program

SHover Zoomchip

The SHover Zoomchip application is deemed as adware by security researchers because it serves as a private marketing platform of adware developers. The SHover Zoomchip app travels incorporated with freeware setup files that most users install via the 'Typical' or 'Express option without fully aware of what is deployed on their PC. The SHover Zoomchip adware can appear in your web client and 'Programs and Features' module in 'Control Panel' in several forms. The SHover Zoomchip adware may present itself as an add-on, a plugin, a Browser Helper Object, a toolbar and an extension. The SHover Zoomchip adware can be instructed by its developers to inject banners, ad panels and pop-ups in your web browser during every online session of yours thanks to a registry key in Windows. Moreover, ads by adware are not considered safe, and SHover Zoomchip may display links to potentially harmful...

Posted on March 30, 2015 in Possibly Unwanted Program

Mavradoi

The Mavradoi malware falls in the category of trojan downloaders that hackers employ in sophisticated attacks. The Mavradoi trojan downloader serves as a tool to download other malware such as keyloggers, viruses, and worms. If you detect the Mavradoi trojan downloader on your PC, you might be facing several malware infections.Hackers can use the Mavradoi malware to steal you banking and social media credentials as well as steal your, video, text and image files. Additionally, keep in mind that the Mavradoi trojan downloader can be used to download ransomware on your PC and extort you for money in exchange for the retrieval of your data. Malware analysts point out that Mavradoi can integrate with Windows Explorer in order to manipulate your programs and can open port 80 that attackers may use to gain remote access to your PC. The Mavradoi trojan downloader can be found in corrupted...

Posted on March 30, 2015 in Trojan

Dafterdod

Malware researchers use the Dafterdod designation to specify a trojan used by hackers to conceal their activity on infected computers. The Dafterdod can be inserted in your system by trojan downloaders and may arrive as an attached file from spam emails. The Dafterdod trojan can place its files in the 'ProgramFiles' folder with names that will not raise suspicion in the user. The Dafterdod trojan is programmed to create an uninstaller that can erase traces from other malware and help hackers avoid detection. The operations of the Dafterdod trojan are facilitated by a BAT file that can be linked to a registry key which allows Dafterdod to be run at Windows boot-up. You should note that the Dafterdod trojan can connect to a remote server and install on your PC other malware, steal files, copy a digital certificate and record your geographical location. The Dafterdod trojan can perform a...

Posted on March 30, 2015 in Trojans
1  2  3  4  5  6  7  8  9  10  11  12  Next     Total items: 13488