Threat Database

Every day new computer threats threaten and harm computers around the world. Many computer threats including viruses, adware, trojans, rogue anti-spyware programs and other malware can be installed onto your computer without your knowledge, potentially damaging files on your hard drive. Our threat database provides you with detailed threat analysis on different types of computer threats to help you understand how to remove and avoid them.

The ESG threat database is updated on a continual basis to provide our users with information specific to threats affecting their computer. Each day our threat research team analyzes data from a wide array of threat types. Here computer users are able to decipher types of well-known threats as well as new and emerging harmful software. The information on the ESG threat database provides data to detect and remove all known types of malware threats.

Most Trending Malware in the Last 7 Days

Threat Name Threat Level Alias Detection Count Date
22/10 VBS/Agent.NSW!tr.dldr [Fortinet]
Trojan.Amonetize.9614 [DrWeb]
VBS/TrojanDownloader.Agent.NSW [ESET-NOD32]
3,241,775 February 3, 2014 EST
55/10 not-a-virus:WebToolbar.Rubar [Ikarus]
Adware.Win32.Rubar.a [Baidu-International]
PUA.Toolbar.Rubar! [Agnitum]
1,437,220 May 2, 2014 EST
11/10 Win32/ELEX.BM [ESET-NOD32]
Adware.Mutabaha.107 [DrWeb]
Suspicious_GEN.F47V0116 [TrendMicro-HouseCall]
935,871 December 29, 2014 EST
11/10 N/A 761,336 January 13, 2016 EST
11/10 Generic.943 [AVG]
Riskware/OptimizerPro [Fortinet]
a variant of Win32/OptimizerEliteMax.C potentially [ESET-NOD32]
847,901 February 27, 2012 EST
22/10 N/A 640,715 September 12, 2013 EST
55/10 N/A 628,614 January 13, 2016 EST
22/10 N/A 1,094,566 October 14, 2013 EST
22/10 HEUR/QVM10.1.Malware.Gen [Qihoo-360]
Adware.Win32.MultiPlug.BDFn [Baidu-International]
Generic6.AXCM [AVG]
736,036 May 23, 2014 EST
55/10 N/A 583,781 September 11, 2014 EST
55/10 MalSign.Skodna.E86 [AVG]
a variant of Win32/Toolbar.Escort.A [ESET-NOD32]
AdWare.DelBar [VBA32]
559,533 September 8, 2014 EST
55/10 N/A 437,625 September 8, 2014 EST
22/10 N/A 517,246 September 16, 2013 EST
55/10 Trojan.Win32.Generic!SB.0 [VIPRE]
W32/Downloader.X.gen!Eldorado [Authentium]
435,707 September 11, 2014 EST
55/10 PE:Malware.RDM.26!5.20[F1] [Rising]
Adware.Win32.Linkury.U [Baidu-International]
a variant of Win32/Toolbar.Linkury.U.gen potential [ESET-NOD32]
630,204 May 2, 2014 EST
55/10 PUP.Optional.Delta.A [Malwarebytes] 404,136 September 1, 2014 EST
22/10 PUA.Win32.WInterEnhance.81 [Baidu-International]
Wajam (fs) [VIPRE]
Trojan.Malware.Win32.xPack.i [ByteHero]
592,813 January 13, 2016 EST
11/10 Adware.Win32.CrossAd.CW [Baidu-International]
Crossrider.WFB [AVG]
Trj/Genetic.gen [Panda]
868,591 December 31, 2014 EST
22/10 N/A 378,479 January 21, 2013 EST
22/10 Adware.SaveSense (fs) [VIPRE]
Adware.SaveSense.1 [DrWeb]
Win32:Adware-gen [Adw] [Avast]
379,223 December 18, 2013 EST
22/10 a variant of Win32/BrowseFox.G [ESET-NOD32]
Trojan/Win32.Zapchast [AhnLab-V3]
TROJ_GEN.F47V0125 [TrendMicro-HouseCall]
406,419 March 6, 2014 EST
55/10 Riskware/Elex [Fortinet]
PUP/XTab [Panda]
Artemis!5C76D5C030CB [McAfee]
665,530 January 22, 2016 EST

Threat Categories

We continuously collect and analyze data to detect emerging trends in new malware threats. Search the different types of threats provided below to help you identify and research on a particular threat that may be infecting your computer.

There are 14860 threats listed on ESG threat database.

Threat Type Average Threat Level Threat Description
Adware 22/10 Adware or advertising-supported software is any software package that automatically plays, displays or downloads advertisements to a computer after the software is...
AOL Parasites An AOL parasite is a malicious computer program designed to harm users of specific America Online software, especially AOL Instant Messenger (or AIM). It can also...
Backdoors 66/10 A backdoor (also known as a trap door or wormhole) in a computer system is a method of bypassing normal authentication, securing remote access to a computer, obtaining...
Browser Hijackers 55/10 A browser hijacker (sometimes called hijackware) is a type of malware program that alters your computer’s browser settings so that you are redirected to Web sites...
Browser Plugins Browser plugins (sometimes called plugins, plug-ins, addin, add-in, addon, add-on, snap-in or snapin) are additional pieces of software that add extra capabilities to...
Dialers 66/10 A dialer (US) or dialler (UK) is an electronic device that is connected to a telephone line in order to monitor the dialed numbers and alter them to seamlessly provide...
Fake Error Messages Fake warning messages (sometimes referred to as fake error messages or fake security alerts), are deceptive notifications that usually appear in the form of pop-ups...
Flooders Flooders are malicious programs that attempt to overload a connection by sending various intrusive attacks, in order to make a computer resource unavailable to its...
Keyloggers 88/10 Keystroke logging (often called keylogging) is the practice of noting (or logging) the keys struck on a keyboard. There are currently two types of keylogging methods,...
Mail Bombers In Internet usage, mail bombers (or e-mail bombers) are those that perpetrate a form of net abuse consisting of sending large volumes of e-mails to an address in an...
Malicious Websites Malicious websites are described as multiple, overlapping browser windows, some of which contain no indication of their origins. An attacker could arrange windows in...
Malware 1010/10 Malware (or malicious software) is software designed to infiltrate or damage a computer system without the owner’s informed consent. The expression is a general term...
Misleading Programs Misleading programs or applications intentionally misrepresent the security status of a computer. Misleading programs attempt to convince you that potential malware or...
Network Management Tools Network management refers to the activities, methods, procedures and tools that pertain to the operation, administration, maintenance and provisioning of networked...
Nukers A nuker is a malicious computer program similar to a Trojan that carries a destructive payload, thus its namesake. A nuker affects overall computer performance,...
Phishing In the field of computer security, phishing is the criminal fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit...
Potentially Unwanted Programs The Internet is filled with free programs and tools making promises they fall short of, or that once installed performs unwanted acts. Potentially unwanted programs or...
Ransomware 1010/10 In the real world, when you hear the word ransom, you immediately think someone or something is being held hostage until demands are met, which is usually in the form...
Remote Administration Tools A Remote Administration Tool (known more commonly on the Internet as a RAT) is used to remotely connect and manage single or multiple computers with a variety of tools...
Rogue Anti-Spyware Program Rogue anti-spyware (or rogue security software) is an application that uses malware or malicious tools to advertise or install itself or to force computer users to pay...
Rogue Anti-Virus Program 1010/10 A rogue anti-virus program is a type of computer parasite not unlike that of a Trojan horse virus. Rogue anti-virus programs are typically installed onto your computer...
Rogue Registry Cleaner 1010/10 Rogue registry cleaners deceive you into thinking they are capable of fixing and cleaning your computer’s registry. Rogue Registry Cleaners use misleading security...
Rootkits 1010/10 A rootkit is a software system that consists of a program or combination of several programs designed to hide or obscure the fact that a computer system has been...
Sniffers 33/10 A sniffer (also known as a packet or network analyzer, or for particular types of networks, an Ethernet sniffer or wireless sniffer) is computer software or computer...
Spam Spam is the abuse of electronic messaging systems to send unsolicited bulk messages indiscriminately. While the most widely recognized form of spam is e-mail spam, the...
Spyware 66/10 Spyware is computer software that is installed surreptitiously on a personal computer to collect information about a user, their computer or browsing habits without...
Trojan Downloader A Trojan downloader is usually a standalone program that attempts to secretly download and run other files from remote web and ftp sites. Typically Trojan downloaders...
Trojans The Trojan horse, also known as Trojan, in the context of computing and software, describes a class of computer threats (malware) that appears to perform a desirable...
Viruses 88/10 A computer virus is a computer program that can copy itself and infect a computer without the permission or knowledge of the owner. The term “virus” is also...
Worms 55/10 A computer worm is a self-replicating computer program. It uses a network to send copies of itself to other nodes (computers on the network) and it may do so without...

Search by Letter:
A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  0  1  2  3  4  5  6  7  8  9  
Home > Threat Database
Home | SpyHunter Risk Assessment Model | Privacy Policy | EULA | Additional Terms and Conditions
Copyright 2003-2016. Enigma Software Group USA, LLC. All Rights Reserved.