BlackJockerCrypter Ransomware

The BlackJockerCrypter Ransomware was first observed on March 20, 2017, and is an encryption ransomware Trojan designed to force computer users to pay large ransoms to recover their files, which the BlackJockerCrypter Ransomware takes hostage. The BlackJockerCrypter Ransomware receives its name from the email address used by con artists to contact the victims. The BlackJockerCrypter Ransomware belongs to a large ransomware family that includes the Globe V3 ransomware engine. The threats in this family tend to be effective in bypassing many anti-virus programs and detection methods on targeted computers. The BlackJockerCrypter Ransomware’s main intended victims are small businesses, as well as business networks and servers. The BlackJockerCrypter Ransomware also is designed to carry out an effective attack against individual...

Posted on March 22, 2017 in Ransomware

AnonFive Ransomware

The AnonFive Ransomware is an encryption ransomware Trojan. Threats like the AnonFive Ransomware have become quite common since 2015. The AnonFive Ransomware follows an attack similar to most ransomware encryption Trojans. The AnonFive Ransomware will encrypt the victim’s files using a strong encryption method. Then the victim is asked to pay a large ransom to receive the decryption key necessary to recover the affected files. Threats like the AnonFive Ransomware take the victims’ files hostage and then demand a ransom payment to restore the affected files. Malware analysts first detected the AnonFive Ransomware on March 16, 2017. The AnonFive Ransomware belongs to a very large family of ransomware Trojans based on HiddenTear. This is an open source ransomware engine that has been responsible for countless ransomware...

Posted on March 22, 2017 in Ransomware

Tlerauic

The Tlerauic program is distributed to users via free software packages, which many users handle with the ‘Express’ and ‘Typical’ option. Computer users may find Tlerauic in the company of riskware such as Advanced PC Care and Glindorus . The Tlerauic program has no official site, does not come with a valid digital signature and does not offer ownership information. PC security researchers alert that Tlerauic is an adware that may inject code into browsers like Google Chrome, Internet Explorer, Edge, Opera and Mozilla Firefox. An investigation into Tlerauic revealed that the Tlerauic adware features an array of DLLs tailored to popular Internet clients, which are used to load advertising content on the pages you open. The DLLs employed by Tlerauic are not standalone programs and are loaded on the memory...

Posted on March 22, 2017 in Possibly Unwanted Program

Lick Ransomware

The Lick Ransomware is a ransomware Trojan that includes a large image of a tongue kiss using an ASCII text. The Lick Ransomware is a new variant of the Kirk Ransomware, a recently released encryption ransomware Trojan-themed around Star Trek that also included ASCII images in its ransom note. The Lick Ransomware seems to be part of an emerging family of ransomware that has this characteristic and has targets in Europe and the English-speaking world. Malware researchers first reported on the Lick Ransomware on March 22, 2017. The Lick Ransomware is being distributed through the use of spam email attachments, which use corrupted scripts to download and install the Lick Ransomware on the victim’s computer. The Lick Ransomware and previous variants seem to be disguised as ‘file decryptors’ by taking advantage of...

Posted on March 22, 2017 in Ransomware

Motd Ransomware

The Motd Ransomware falls into the category of a crypto-threat that uses the advanced RSA encoding algorithm to lock the data of its victims and avoid attempts of decryption. The Motd Ransomware may rely on different methods to be delivered, and attack victims – fake downloads, spam e-mails and the RDP (Remote Desktop Protocol) are just some of the channels that may be used to proliferate the Motd Ransomware’s payload. After encrypting the files, the Motd Ransomware displays a ransom note in the destination /etc/motd carrying a ‘message of the day’ on UNIX-based systems. The Motd Ransomware is similar to most Encryption Trojans and attacks a wide range of file formats including video, audio, ZIP archives, 3D models, DOC documents, slideshows, spreadsheets, etc. Looks like that the main targets of the Motd Ransomware...

Posted on March 21, 2017 in Ransomware

Search.real-desktop.de

The Search.real-desktop.de site is associated with the Real Desktop 2.0 software offered at Real-desktop.de to Windows OS users looking to spice up their desktops experience. Real Desktop 2.0 is a product of SchillerGames that is said to provide a 3D-like environment for your desktop and notebook. PC users may install the free version of Real Desktop that is promoted through freeware bundles and gives their desktop a 3D feel with available customization regarding size, images and shapes. When you install the Real Desktop by SchillerGames, the program may change your Internet settings that relate to your new tab page design and start page choice. The free version of the Real Desktop might direct your browser to load Search.real-desktop.de as the default new tab and start page while Real Desktop is running in the background. You may...

Posted on March 21, 2017 in Browser Hijackers

Event Monitor TSS

The detection named Event Monitor TSS refers to a Trojan that is known to run as em.exe and feature the description ‘Event Monitor.’ The Event Monitor Trojan is used for a technical support tactic, hence the name Event Monitor TSS. The Event Monitor TSS Trojan is a program that may arrive on computers via free software bundles and fake software updates for Adobe Flash and Java. The Event Monitor TSS Trojan is a threat that is aimed at users who run one of the latest versions of Windows and may install free programs with the ‘Typical’ and ‘Express’ options. The authors of the Event Monitor TSS rely on the premise that many users may not explore the ‘Custom’ installation options of software installers and allow their product to be installed in the background. Once the Event Monitor TSS...

Posted on March 21, 2017 in Possibly Unwanted Program

ZinoCrypt Ransomware

The ZinoCrypt Ransomware – 2017 Edition is a new brand of crypto-threat that appeared on PC security reports on March 20th, 2017. The ZinoCrypt Ransomware is an encryption Trojan that appears to be a standalone project of an unknown programmer. The ZinoCrypt Ransomware is aimed at Windows OS users in developed countries in the Western Europe and North America. PC security researchers report that the ZinoCrypt Ransomware Trojan is dispersed among users by using spam messages and links to corrupted pages on the Internet. PC users may be invited to download a text document from a spam message and run a macro script from an untrusted source, which would allow the ZinoCrypt Ransomware run on the system. The ZinoCrypt Ransomware is not a unique threat, and it behaves almost identically to well-documented threats like the...

Posted on March 21, 2017 in Ransomware

Study Reveals 96% of Websites Attacked by Malicious Bots

There is substantial and overwhelming evidence to support the fact that the Internet is strife with attacks from malware, hackers, and sophisticated bots. In a recent study conducted by Distil Networks, a company that deals with detection and mitigation of malicious website attacks, 96% of websites get attacked by automated bot programs. The Internet is a risky place, and if you are a webmaster, you know firsthand how difficult it can be in maintaining a website when it comes to attacks from malicious entities. Bots, or automated programs that run automated tasks and scripts, are commonly used in the modern-day landscape of the Internet to attack websites. IN their attacks bots use scripts to scour data and sometimes compromise websites for one of many purposes, sometimes to spread malware or carry out aggressive phishing attacks....

Posted on March 21, 2017 in Computer Security

ForSearch.net

ForSearch.net is an unreliable site that is presented to users as a search service. The service on ForSearch.net does not include ownership and contact information, as well as links to the privacy policy and terms of use agreement found on legitimate pages. Visitors at ForSearch.net are greeted by a simple search box, the ForSearch logo, and three options to search with ForSearch, Google and Bing. However, these options do not lead to customized searches but to forsearch.net/search?q=%searchterm%&hl=vn&engine=bing, which is a presented as the legitimate Bing.com results page. Computer security investigators found that ForSearch.net is associated with a browser hijacker program that may change the Internet settings of users in Google Chrome, Internet Explorer, Opera and Mozilla Firefox. The browser hijacker linked to...

Posted on March 20, 2017 in Browser Hijackers

CryptoDevil Ransomware

The CryptoDevil Ransomware is a file encoder Trojan that was reported by cybersecurity researchers on March 19th, 2017. The CryptoDevil Ransomware appears to be a standalone project that is aimed at English-speaking countries. The CryptoDevil Ransomware is styled as a legitimate program and includes an ‘About’ section and interactive decryption panel along with a price table that states the ransom increases as time passes and climaxes at 100 USD on the 72nd hour. 82 hours later the operator claims to delete the decryption key and recovery is practically impossible. The CryptoDevil Ransomware may arrive on systems via spam emails, corrupted software packages and exploit vulnerabilities on your system. The CryptoDevil Ransomware has two versions that behave as a screen locker and a file encryptor. The presence of two...

Posted on March 20, 2017 in Ransomware

Kirk Ransomware

The Kirk Ransomware is a file encoder Trojan that might be the work of a die-hard fan of the Star Trek universe. The Kirk Ransomware surfaced on security reports on March 16th, 2017 and the Trojan is rigged with many references to Gene Roddenberry’ Star Trek science fiction franchise. The Kirk Ransomware may be spread among the Windows OS community via spam messages and corrupted text documents that act as installers for the threat. The Kirk Ransomware arrives on computers bundled with a Spock Decryptor and works in offline mode. The Kirk Ransomware generates a key file before it proceeds to encode data and obfuscates the encryption key by using the RSA-2048 cryptographic algorithm. The Kirk Ransomware is a standalone project, but it shares similarities with the Karma Ransomware and needs the cooperation of the user to...

Posted on March 20, 2017 in Ransomware

HAHAHA Ransomware

The HAHAHA Ransomware is an encryption Trojan that is based on the open-source CryptoWire Ransomware, which was published on Github.com in September 2016. Since the release of CryptoWire, it was used for the development of various crypto-threats that include the Lomix Ransomware and the ‘_morf56@meta.ua_ File Extension’ Ransomware . The HAHAHA Ransomware appears to be the work of a less skilled programmer who used CryptoWire to build a customized version that uses slightly modified ciphers and connects to private ‘Command and Control’ servers on the Open Web. The first sightings of the HAHAHA Ransomware were reported by users in Western Europe and the United States of America in the first week of March 2017. The distribution campaign for the HAHAHA Ransomware relies on spam messages that carry macro-enabled...

Posted on March 20, 2017 in Ransomware

MyMovie Start

The MyMovie Start browser extension by myAppline that you can find at Myappline.com/utilities/moviesearch/ and the Chrome Webstore is promoted as a free to use media discovery tool. The MyMovie Start extension functions similarly to iMedia Start by ienjoyapps.com and claims to help users discover new movies movie stars, ratings by film critics and dig into the history of movies around the world. You can find the homepage for MyMovie Start at myappline.com/utilities/moviesearch/ and use the built-in search that would lead you to a results page at gomovix.com. MyMovie Start is designed to provide users with a new tab overhaul and display links to sites like Facebook, YutTube, Gmail, Amazon, eBay, Twitter and Pinterest. Computer users that are looking to install the MyMovie Start browser extension for Google Chrome should take into...

Posted on March 20, 2017 in Possibly Unwanted Program

Search Tab New

The Search Tab New browser extension is promoted as a free Chrome companion that can help you customize the appearance and feel of your new tab page in Google Chrome, as well as integrate search engines like Yahoo, Google, Bing and DuckDuck go into one search box. When you install the Search Tab New browser extension it may require the following privileges: Read and change all your data on the websites you visit. Read and change your browsing history. Change your new tab page settings. Change your privacy-related settings. Display notifications. Read and change your bookmarks. Manage your apps, extensions, and themes. The Search Tab New extension behaves and performs the same way as the Search Manager extension. Both apps are not deemed as trusted and lack representation on the Chrome Webstore. Cyber security...

Posted on March 17, 2017 in Browser Hijackers
1 2 3 4 5 6 7 8 9 10 11 12 1,134