Track Global Malware Trends
View the trending of malware based on the 'detection count' reports of threats found in infected PCs and volume levels which reflect malware infection rates. For real-time data on malware outbreaks worldwide, visit MalwareTracker.
Top 10 Malware Threats
Rank Malware Infected PCs %Change Trend
1 Adware Helpers 2,100,214 3%
2 Conduit Search/Toolbar 1,510,800 2%
3 PUP.SupTab 1,104,594 4%
4 PUP.SuperWeb 908,846 3%
5 PUP.InstallCore 902,936 2%
6 PUP.Optimizer Pro 891,472 2%
7 Adware.Multiplug/Variant 881,053 4%
8 Iminent Toolbar 751,427 3%
9 PUP.CrossRider 646,058 5%
csv
Download as CSV
More Info
i

Top Security News

Top 20 Countries Found to Have the Most Cybercrime
Have you ever wondered which countries face the most cybercrime? If you have ever wondered which countries have the most cybercrime, then you may be surprised to know that there are few contributing factors that attract cybercriminals to specific regions of the world. Security research firm,...
Gmail Filter Virus Attacks Gmail Users Turning Them Into Spammers
A new vulnerability within the Gmail email account system, called Gmail Filter Virus, is currently affecting some Gmail users taking control of their account turning it into a virtual spam proxy. Many Gmail account users will utilize the 'filters' feature for various automation functions in...
Crafty Scammers Offer a Fake Survey Bypassing Script That is Really a Survey Scam Campaign in Disguise
Just when you think that you have heard about some of the most clever scams online, cybercrooks amaze us all again as they introduce their very own solution to online survey scams. The people responsible for survey scams are not only still tricking computer users through the use of their annoying...

More Articles

VirLock Ransomware

Screenshot

The VirLock Ransomware is a ransomware Trojan that takes computers hostage and then demands payment from the computer users using BitCoin, a crypto-currency that is known for permitting anonymous online payments. The VirLock Ransomware will threaten computer users, claiming that the VirLock Ransomware has found pirated software on the infected computer and threatening to report the victim to the authorities unless the fine is paid. These claims have no basis. The VirLock Ransomware cannot check your computer for pirated software or alert the authorities. Rather, the VirLock Ransomware is engineered to lock down your computer and prevent access to your files. If the VirLock Ransomware...

Posted on December 10, 2014 in Ransomware

CryptoWall Ransomware

Screenshot

The CryptoWall Ransomware is a ransomware Trojan that carries the same strategy as a number of other encryption ransomware infections such as Cryptorbit Ransomware or CryptoLocker Ransomware . The CryptoWall Ransomware is designed to infect all versions of Windows, including Windows XP, Windows Vista, Windows 7 and Windows 8. As soon as the CryptoWall Ransomware infects a computer, the CryptoWall Ransomware uses the RSA2048 encryption to encrypt crucial files. Effectively, the CryptoWall Ransomware prevents computer users from accessing their data, which will be encrypted and out of reach. The CryptoWall Ransomware claims that it is necessary to pay $500 USD to recover the encrypted...

Posted on May 12, 2014 in Ransomware

CryptoLocker Ransomware

Screenshot

The CryptoLocker Trojan is a ransomware infection that encrypts the victim's files. CryptoLocker may typically be installed by another threat such as a Trojan downloader or a worm. Once CryptoLocker is installed, CryptoLocker will search for sensitive files on the victim's computer and encrypt them. Essentially, CryptoLocker takes the infected computer hostage by preventing access to any of the computer user's files. CryptoLocker then demands payment of a ransom to decrypt the infected files. CryptoLocker is quite harmful, and ESG security analysts strongly advise computer users to use an efficient, proven and updated anti-malware program to protect their computer from these types of...

Posted on September 11, 2013 in Ransomware

MyStart by Incredibar

Screenshot

MyStart is a browser hijacker that uses the MyStart by Incredibar toolbar and a browser hijacking component that forces its victims to visit the MyStart.Incredibar.com website. This website is a low-quality search engine that displays more advertisements than legitimate results. Even worse, several of MyStart's search results may lead computer users to websites containing malicious content. Although MyStart actually provides a supposed tool to remove this component from the victim's web browser, ESG security researchers recommend disregarding this component and instead removing MyStart with the help of a reputable anti-malware utility. MyStart can refer to both the low-quality...

Posted on July 31, 2012 in Adware

FBI Moneypak Ransomware

Screenshot

ESG security researchers have received reports of a ransomware infection, known as the FBI Moneypak ransomware, that targets computer users in the United States. The FBI Moneypak ransomware infection will claim that the victim's computer was involved in viewing child pornography and then demands payment of a 100 dollar 'fine' to be sent via MoneyPack. Of course, that a criminal charge as serious as child pornography would be punished with a mere 100 dollar fine is laughable. There is a reason for this, the FBI Moneypak ransomware is not really from the FBI. Rather, this message is actually part of a common malware scam. The FBI Moneypak ransomware scam will use a Winlocker, that is,...

Posted on June 25, 2012 in Ransomware

Ukash Virus

Screenshot

The so-called Ukash Virus is a ransomware Trojan that receives its name because Ukash Virus requires that its victims use Ukash (a legitimate money transfer service) to transfer the ransom funds. This dangerous Trojan infection is composed of a Winlocker component that basically blocks access to the infected computer system, disabling access to the infected computer system's desktop, Task Manager, command line, Registry Editor and other services and applications. There are countless variants of the Ukash Virus, designed to target various different countries in Europe and North America. ESG malware analysts strongly advise against paying the ransom that this malware infection tries to...

Posted on June 15, 2012 in Ransomware

Live Security Platinum

Screenshot

Live Security Platinum is one of the many fake security programs in the WinWebSec family of malware. Although ESG security researchers have been following the family of malware for several years, Live Security Platinum is a relatively new variant first detected in 2012. Because of this, it is pivotal to ensure that your security software is fully updated. Like most fake security programs, Live Security Platinum is designed to induce PC users to purchase a worthless 'full version' of Live Security Platinum. To do this, Live Security Platinum will try to scare the computer user with a variety of fake error messages, pop-up alerts from the Taskbar and a convincing fake scan of the...

Posted on June 1, 2012 in Rogue Anti-Spyware Program

DNS Changer

Screenshot

DNS Changer is a Trojan that is designed to force a computer system to use rogue DNS servers. Also, DNS Changer is being referred to as the Internet Doomsday Virus, Ghost Click Malware, DNS Changer Rootkit, DNS Changer Malware, DNS Changer Trojan, DNS Changer Virus, FBI DNS Changer or DNSChanger. A DNS Changer infection will typically have two steps, in order to reroute the infected computer’s traffic to these malicious DNS servers: A DNS Changer malware infection will change the infected computer system’s settings, in order to replace the DNS servers to rogue DNS servers belonging to hackers or online criminals. The DNS Changer malware infection will then try to...

Posted on November 25, 2011 in Trojans

‘Traffikkim.xyz’ Pop-Ups

Web surfers that experience pop-up windows from Traffikkim.xyz may want to know that their computer is infected with a browser hijacker that promotes bogus computer assistance. The Traffikkim.xyz browser hijacker edits your Internet client settings so that it loads the content on Traffikkim.xyz every time you start an online session. Moreover, the messages on Traffikkim.xyz are displayed with JavaScript and users will not be able to close them unless they assess the Windows Task Manager and kill the Web browser process. Security researchers note that the Traffikkim.xyz pop-ups are accompanied by an audio recording of a female voice suggesting that your PC is affected by viruses, spyware and urges users to call 888-973-8415 to receive help. Also, the Traffikkim.xyz pop-ups may resemble the BSOD seen on critical system failures to claim credibility. Computer users presented with the...

Posted on July 29, 2015 in Adware

‘Download2015now.xyz’ Pop-Ups

Security investigators report that the Download2015now.xyz domain is recognized as malicious, and users should abstain from interaction with its content. The Download2015now.xyz domain is associated with several types of cyber threats such as browser hijackers, trojans, rogueware, and adware. Users who prefer the 'Express' or 'Typical' option of freeware installers may allow a browser hijacker to be installed as well and experience pop-ups by Download2015now.xyz. The Download2015now.xyz pop-ups contain links to phishing web pages and threats like SavePass , Kazy and ThinkPoint . The Download2015now.xyz pop-up windows can take different forms depending on what Web browser you use, but all versions will lead the users to a small window that appears to resemble a Windows 7 program window. The fake program windows on Download2015now.xyz suggest that an Adobe Flash Player Update is...

Posted on July 29, 2015 in Browser Hijackers

‘Support-security-alert.net’ Pop-Ups

Security authorities alert users that the Support-security-alert.net domain is associated with a browser hijacker that changes your homepage and shows pop-ups. The browser hijacker in question is programmed to present infected users with the content on Support-security-alert.net and direct them to call supposedly certified technicians on the toll-free phone number 1844-499-3631. Needless to say, the aren't legitimate technical support services that would use browser hijacking software to promote their expertise. The fake technicians associated with Support-security-alert.net may attempt to convince users to purchase a license in order to assist them in removing potential threats, and computer users may become victims of financial fraud and data theft. You should dial 1844-499-3631 and follow instructions on the Support-security-alert.net pop-up windows. The browser hijacker mentioned...

Posted on July 29, 2015 in Browser Hijackers

Cool Popular Games Toolbar

The Cool Popular Games Toolbar is deployed by the infamous Mindspark Interactive Netowk, LLC. as a toolbar for your web browser that can turn your opened new tabs into gaming centers. The Cool Popular Games toolbar may provide you with access to arcade, puzzle, and classic games, but its main objective is to show ads and divert web traffic to Ask.com. The Cool Popular Games toolbar can be download from its official web page, but most of its installations are performed through third-party installers. The Cool Popular Games toolbar is considered to be adware and users should avoid installing it. Security investigators point out that the Cool Popular Games adware-powered toolbar has versions for Google Chrome, Mozilla Firefox, and Internet Explorer but is banned from the Chrome Web Store and the Firefox store. You should note that the Cool Popular Games adware will limit your search...

Posted on July 29, 2015 in Browser Hijackers

Unfriend Review Ads

The Unfriend Review application from Big Ocean Development fills the same niche as Unfriend Check and Unfriend Watch and allows users to track which of their Facebook friends have recently unfriended them. The Unfriend Review application could be installed on your computer automatically by handling a freeware bundle with the 'Express' or 'Typical' option. The Unfriend Review app can be downloaded from its official website, and its installer may contain additional offers listed under the 'Advanced' or 'Custom' option. The Unfriend Review app could be bundled with programs like ZoomIt and VPNPrivat . Security experts perceive the Unfriend Review application as a Potentially Unwanted Program (PUP) because it is supported by advertisements that may obstruct your comfortable Internet activities. The Unfriend Review application may use pop-up and pop-under windows, and banners to...

Posted on July 29, 2015 in Adware

DNS Keeper

The DNS Keeper software from GreenTeam Internet Ltd. may have promoted to you as a free web filtering tool that can improve your security thanks to a clod-based technology. The DNS Keeper software can be obtained via freeware packages. You may want to know that the DNS Keeper software is deployed by the same company behind CloudGuard and CloudScout and is deemed as adware. The DNS Keeper app may claim to provide safety, but it will change your DNS settings to reroute your Internet traffic through the servers of advertisers to ensure that you are provided with marketing materials by its sponsors. The DNS Keeper adware might present you with pop-up windows, video ads, in-text hyperlinks to sponsored content and banners. Needless to say, the DNS Keeper adware may provide you with links to harmful domains and corrupted online resources as long as its developers are paid to do so....

Posted on July 29, 2015 in Adware

‘Chrome-wx.updaternow.xyz’ Pop-Ups

The Chrome-wx.updaternow.xyz domain is associated with a browser hijacker that is dispersed among users embedded with freeware bundles. The Chrome-wx.updaternow.xyz browser hijacker can affect Google Chrome, Mozilla Firefox, and Internet Explorer. The Chrome-wx.updaternow.xyz browser hijacker is designed to change your default homepage and show pop-ups from Chrome-wx.updaternow.xyz that urge users to install a supposedly safe update to their Web browser. The updates promoted on Chrome-wx.updaternow.xyz come in the form of a ZIP file that has to be extracted twice before users can obtain the executable update. Users may find it hard to close the messages from Chrome-wx.updaternow.xyz due to the implementation of JavaScript that initiates the update download automatically. Computer users should take into consideration the information above and abstain from installing updates from...

Posted on July 28, 2015 in Browser Hijackers

‘Updater-th.updatenotifier.net’ Pop-Ups

Security investigators recognize the Updater-th.updatenotifier.net domain as unsafe, and it is linked to a known source of cyber threats and badware, namely DownlaodVault.com. The Updater-th.updatenotifier.net pop-up windows in your browser are caused by a browser hijacker affecting your system. The Updater-th.updatenotifier.net browser hijacker is coded to show pop-ups and spread riskware such as the Super Optimizer and the Speed Browser . The Updater-th.updatenotifier.net browser hijacker may have been installed on your computer with a freeware package that you downloaded from a suspicious software distribution platform. Security investigators note that the content on the Updater-th.updatenotifier.net pop-ups can appear differently depending on what Web browser you are using. The common behavior of the Updater-th.updatenotifier.net adware is to notify users with a pop-up window...

Posted on July 28, 2015 in Browser Hijackers

‘Distinct2c.work’ Pop-Ups

The Distinct2c.work pop-up windows that users experience in their web browser may claim to provide a safe update to their browser, but they are generated by adware. Therefore, security analysts warn users not to install software promoted on the Distinct2c.work pop-ups. The adware that is responsible for the Distinct2c.work pop-ups is created to spread riskware, namely the LightningDownloader and others like the TransitSimplified Toolbar . The programs mentioned before could decrease your overall computer performance, and show advertisements loaded on banners and floating ad boxes in your Web browser. The Distinct2c.work pop-ups may use the gray nuance typically associated with the Adobe Flash Player for its background and list features of the legitimate Flash player to claim credibility. However, you should not trust the Distinct2c.work pop-ups and avoid following links on the...

Posted on July 28, 2015 in Adware

‘Windows-delight.info’ Pop-Ups

The Windows-delight.info pop-up messages in your Internet browser are caused by a browser hijacker on your system that is created to promote the tech assistance found on PC2Techs.com website. The Windows-delight.info pop-ups may claim to be from Microsoft and that there have been detected a suspicious activity on your computer, but you should not believe those claims. Moreover, the Windows-delight.info pop-up windows may invite users, not to turn off or restart their PC to avoid data loss in order to create a sense of peril. Users will be urged to call 1-855-233-9250 for immediate assistance from certified technicians on PC2Techs.com The technicians on 1-855-233-9250 that are associated with Windows-delight.info and PC2techs are not trusted, and you are not advised to seek their help. As stated above the Windows-delight.info pop-ups are caused by a browser hijacker that may have...

Posted on July 28, 2015 in Browser Hijackers

‘Support-and-services.info’ Pop-Ups

Security researchers report that fake technical support agents use the Support-and-services.info domain, and you are not advised to follow directions listed on the domain. Computer users that experience pop-up windows by Support-and-services.info may want to know that they are infected with a browser hijacker. The threat may have entered your computer during the installation of a free program with the 'Express' or 'Typical' option. The Support-and-services.info browser hijacker helps scammers scare users into contacting them. The Support-and-services.info pop-up windows may suggest that your Facebook profile and credit card information is in danger because there is spyware on your PC. However, you should not trust the messages on Support-and-services.info and abstain from hasty decisions. As stated above, the Support-and-services.info pop-ups are generated by a browser hijacker and...

Posted on July 28, 2015 in Browser Hijackers

Exploit:HTML/Axpergle.N

The Exploit:HTML/Axpergle.N alert is used security solutions to inform users of an attempted exploit of vulnerabilities in the Adobe Flash Player and Microsoft Silverlight software. The Exploit:HTML/Axpergle.N is part of the Angler Exploit Kit that is widely used by scammers and hackers to show misleading messages and install malware. The Exploit:HTML/Axpergle.N alert can be triggered by web-based attacks at CVE-2013-0074; CVE-2014-0497; CVE-2014-8439 and CVE-2015-0311 vulnerabilities. The Exploit:HTML/Axpergle.N threat detects what browser you are running and what version of Silverlight and Flash is installed on your system. The Exploit:HTML/Axpergle.N attack can allow hackers to install malware on your computer such as trojan droppers, viruses and ransomware. The Exploit:HTML/Axpergle.N threat can be utilized by attacker to introduce Rovnix, Xpiro and Reveton into your system...

Posted on July 27, 2015 in Trojans

Computer Pal

The Computer Pal software is another product by the infamous SuperWeb LLC and is promoted as an advanced tool to help users search faster and smarter on the web. However, security experts perceive the Computer Pal software as adware because the only optimization made available to users is the appearance of many sponsored search results, banners, pop-up windows and inline ads. SuperWeb LLC deploys the Computer Pal adware as a part of free software packages on low-quality application distribution platforms. The Computer Pal adware does not differ much from other SuperWeb products like Clock Hand and Girafarri and may use tracking cookies, read your browsing history and detect your approximate geographical location to show customized commercials. Moreover, the Computer Pal adware may add a task in the Windows Task Scheduler to enable its automatic updates and patches and may install...

Posted on July 27, 2015 in Adware

Bholog.B Trojan

The Bholog.B malware is classified as a trojan that can steal sensitive information like credit card details and passwords by using a keylogger module. The Bholog.B malware is dispersed as an attached file to spam emails and can launch a background process named 'broda.exe' to execute its operations. The Bholog.B keylogger creates several hooks in Windows to record your keystrokes and messages you input in fields on program windows. The Bholog.B malware can edit your Windows Registry to launch at system start-up. Security researchers note that the Bholog.B keylogger can take advantage of Internet Explorer and use it to send the collected data to a remote server. The Bholog.B malware can record what programs you open, your browsing history and user credentials. Computer users infected with the Bholog.B malware are in danger of losing control over their social media accounts and...

Posted on July 27, 2015 in Trojans

Daugava Ads

The distinct banners by Daugava that accompany your Internet browsing activities are displayed by adware on your system. The Daugava adware is deployed embedded with freeware bundles on low-quality software distribution platforms. The Daugava adware is specialized in displaying banners and web page headers that are loaded with promotional offers related to computer hardware, accessories and camping goods predominantly. The Daugava adware is written with the aim of generating affiliate revenue by displaying advertisements in the Internet client of infected users. You should remember that the ads by Daugava are not safe, and you may be provided with corrupted content and redirected to compromised online resources and untrusted online stores. The Daugava adware may use pop-up windows to promote bad toolbars like WhiteSmoke and BlueSprig that can apply several unwanted changes to your...

Posted on July 27, 2015 in Adware
1 2 3 4 5 6 7 8 9 10 11 951