SpyHunter

Malware Remediation Utility

  • Detect & remove the latest malware threats.
  • Malware detection & removal definitions are updated regularly.
  • Technical support & custom fixes for hard-to-kill malware.
* Free Remover allows you, subject to a 48-hour waiting period, one remediation and removal for results found. Read our EULA, Privacy/Cookie Policy & Discount Terms. See more details and alternative free offer.
Play

Top Security News

U.S. Department of State Anticipates Foreign Interference in Midterm Elections, Awards up to $10 Million for Relevant Information Midterm elections in the U.S. are approaching, and given legitimate concerns about misinformation campaigns having affected the 2020 elections, now cybersecurity experts will be involved to back up...
Data-Wiping 'HermeticWiper' Malware Hits Windows Computers Amid Russian Ukraine Invasion The Russian invasion of Ukraine has stirred relations across the globe among many countries for many reasons. Amid the Russian invasions into Ukraine with many looming uncertainties, the hackers...
New Report Shows 1,100% Surge in MacOS Malware A shocking report that was just published by Atlas VPN shows that new malware infections developed specifically for macOS saw a whopping increase of almost 1,100% verses 2019. The report, which was...

Top Articles

Anti-Malware Lab

Anti-Malware Lab screenshot

Are you getting alerts from Anti-Malware Lab? Don't be tricked, Anti-Malware Lab is a not a real security application. It is a kind of program known as a rogue anti-malware application. These kinds of programs pretend to be genuine anti-malware utilities to trick you into buying them. Specifically, Anti-Malware Lab's interface is designed to mimic the interface for a typical Windows Security scanner. Anti-Malware Lab takes over your computer, to make you think it has a malware infection. Then, it will prompt you to buy Anti-Malware Lab to get rid of the supposed infection. Don't fall for it; Anti-Malware Lab is nothing but a scam. How Anti-Malware Lab Enters Your Computer Surprisingly, it...

Posted on July 6, 2011 in Rogue Anti-Spyware Program

Keylogger Zeus

Zeus Keylogger is a malware program that is designed to steal a computer user's private information. A keylogger is a program that is used to record every key that is pressed on the infected computer's keyboard. Zeus Keylogger also has the capacity to take the recorded data and relay it to a third party. A hacker can take all of this information and isolate online passwords, credit card information, and online banking data. To protect your privacy, out team of PC security researchers recommends using an anti-malware program to identify and remove Zeus Keylogger. How Zeus Keylogger Steals Your Personal Information Zeus Keylogger is specifically engineered to target financial information. This nasty spy program contains an extensive list...

Posted on August 16, 2011 in Keyloggers

WebDiscover Browser

WebDiscover Browser screenshot

WebDiscover Browser is an adware threat developed by a Canada-based company named WebDiscover Media. Once installed on a PC, the app makes a series of unwanted changes to all browsers installed on the computer, leading to a deteriorating online surfing experience. WebDiscover replaces the default home pages and search engines of affected Internet browsers with its own WebDiscover Homepage and WebDiscover Search, respectively. Furthermore, the app modifies the "new tab" settings so that the corrupted browsers launch the program's own search portal page when the user opens a new tab. Chrome users may not even recognize WebDiscover as an unwanted program and think they are using the regular...

Posted on July 3, 2015 in Browser Hijackers

How to Fix Mac Error Code 43 When Copying Files

How to Fix Mac Error Code 43 When Copying Files screenshot

Getting an OS system error message while working on a project can be quite an unpleasant surprise. Whether relating to MS Windows, or Mac OS, such a bug is always bound to disrupt your normal computer work. While some errors tend to be system-specific, others can affect both Windows and Mac-based systems, albeit designating totally different problems. The so-called Code 43 error message, for example, is primarily associated with device driver problems in Windows PCs, on the one hand, and file transfer issues on Mac machines, on the other. If you are using Windows and looking for a way to fix this specific error, click here for a guide with possible solutions. If you are a Mac user,...

Posted on January 30, 2019 in Issue

KMSpico

KMSpico screenshot

KMSpico is a software made to illegally activate Windows 10 and other Windows operating systems for free. This software is unsafe and has no connection to the Microsoft Corporation. Instances of KMSpico may open the way to further malware infections, installation of Potentially Unwanted Programs (PUPs) and more. There are many websites online that offer versions of KMSpico. Nearly all of them bundled with adware, malware and more. This may quickly put a computer at risk without the consent of the user. What does KMS stand for? KMS stands for Key Management Service, a technology used by Microsoft to activate services on a local network. This is done to remove the need for connecting each...

Posted on February 7, 2019 in Potentially Unwanted Programs

Newsbreak.com

Newsbreak.com screenshot

At first glance, the Newsbreak.com website appears to be a useful tool that would provide its visitors with the latest news. However, this is one of the countless bogus websites online that do not provide any content of value, and instead, seek to benefit from their visitors using various shady tricks. Spams Users with a Constant Flow of Advertisements Upon visiting the Newsbreak.com page, users will be asked to permit the site to display Web browser notifications. Keeping in mind that this fake page poses as a legitimate news website, many users may be tricked to allow browser notifications thinking that they will be alerted for the latest breaking news. However, this is not the case,...

Posted on February 3, 2020 in Browser Hijackers

Segurazo

Segurazo screenshot

The Segurazo application, a/k/a SAntivirus, presents itself as a helpful, genuine antivirus tool capable of bringing considerable benefits to those who give it a chance. However, in reality, Segurazo is far from helpful and is certainly not as trustworthy a tool as one would expect from an antivirus application. Instead of effective threat detection and real-time protection, SAntivirus will bombard you with dozens of falsely exaggerated security reports in a relentless effort to urge you to buy the premium version of this dodgy tool. Segurazo As a Drive-By Download In general, malware actors tend to distribute Potentially Unwanted Programs (PUPs) by smuggling them into software bundles...

Posted on March 6, 2020 in Potentially Unwanted Programs

DarkSide Ransomware

DarkSide Ransomware screenshot

DarkSide Ransomware is a type of malware that is created for the purpose of extorting money from computer users through holding their PC for hostage. The task of DarkSide Ransomware accomplishing its money extortion scheme starts with it encrypting files, which takes place after loading on a system often due to the user opening a malicious spam email attachment. The DarkSide Ransomware is known to encrypt many files and append them with similar file extensions. While each file encrypted by DarkSide Ransomware can be easily identified and found, they cannot be accessed or opened due to undefeatable encryption. Due to such, a computer user wanting to get their system back to normal...

Posted on August 13, 2020 in Ransomware

How to Check Storage on Mac

Mac devices are often regarded to be finely tuned and possess harmonious systems that combine both hardware and software components. Unfortunately, one drawback that has been often associated with these devices is that it is notoriously difficult, and sometimes impossible, to upgrade individual hardware components, such as getting a bigger SSD to store more videos, photos, movies, etc.  This means that Mac users may need to pay more attention to their Mac storage space, how much is still available, and if they will need to delete some existing files to make room for new content. As a result, knowing how to check your Mac's storage quickly could be a handy skill.  Checking Disk Space on Mac Locate and click on the Apple menu in the...

Posted on February 15, 2022 in Issue

APT27

APT27 (Advanced Persistent Threat) is the name of a hacking group that originates from China and tends to go after high-profile targets. The APT27 also is known under various other aliases, including Emissary Panda, LuckyMouse and BronzeUnion. Among the most well-known campaigns carried out by the APT27 is their attacks targeting United States' defense contractors. Other popular operations by the APT27 include a campaign against a number of companies operating in the financial sector, as well as an attack launched against a data center located in Central Asia. The hacking tools in the weaponry of the APT27 include threats that would allow them to carry out reconnaissance operations, collect sensitive files from the infected host or take...

Posted on May 5, 2020 in Advanced Persistent Threat (APT)

XHAMSTER Ransomware

The XHAMSTER Ransomware threat is being used by cyrbercriminals to lock the data of their victims. The XHAMSTER Ransomware is a new variant of the Phobos Ransomware. The strong encryption algorithm utilized by XHAMSTER ensures that the affected files will be nearly impossible to restore without the assistance of the hackers. More specifically, without having the specific decryption keys in their possession. Once activated on the compromised device, XHAMSTER will affect a wide range of file types, including the victim's documents, photos, PDFs, archives, databases and many more. As part of its actions, the ransomware also will modify the original names of the locked files significantly. First, it will add an ID string generated for the...

Posted on May 4, 2022 in Ransomware

More Articles

HorizonElite

Analysis of the HorizonElite application has determined that its primary function is not to provide any meaningful service to its users. Instead, the application is mostly concerned with monetizing its presence on users' Mac devices by running intrusive ad campaigns. As such, HorizonElite falls into the adware app category. Furthermore, users should be warned that HorizonElite is being spread via questionable methods, meaning that it is also classified as a PUP (Potentially Unwanted Program). For example, the application has been observed hiding inside fake installers. Advertisements associated with such dubious sources are very rarely promoting legitimate destinations or products. Users are far more likely to encounter advertisements...

Posted on August 12, 2022 in Mac Malware, Adware, Potentially Unwanted Programs

ROMCOM RAT

The ROMCOM RAT is a novel malware threat believed to be part of the arsenal of a cybercriminal gang infamous for ransomware attacks. This new Remote Access Trojan threat appears to be under rapid development with the more recent versions boasting expanded functionality and intrusive features. Details about the threat family were revealed in a report by Palo Alto Networks' Unit 42 threat intelligence team. According to their findings, the ROMCOM RAT is created by the Tropical Scorpuis cybercriminal group, the operators behind Cuba Ransomware (COLDDRAW). The ransomware threat has so far been leveraged against 60 victims spread across five crucial infrastructure sectors. Out of the victims found on the group's data leak site, 40 are located...

Posted on August 12, 2022 in Remote Administration Tools

brutusptCrypt Ransomware

The brutusptCrypt Ransomware falls into the category of malware threats designed to specifically lock the data of targeted victims. Upon being activated on the infiltrated devices, the threat will go after numerous, different file types, such as documents, photos, images, PDFs, archives, databases, etc., and encrypt them with a sufficiently strong cryptographic algorithm. When a file is locked, the malware also will add '.brutusptCrypt' to that file's original name. Afterward, the threat will proceed to deliver two ransom notes to its victims. One of the ransom-demanding messages will be contained inside a text file named 'Payment_Instructions.brutusptCrypt.txt.' The message from the cybercriminals states that they are trying to extort...

Posted on August 12, 2022 in Ransomware

'Windows Defender Subscription' Scam

The 'Windows Defender Subscription' scam tries to take advantage of users through deceptive lure emails. The disseminated email messages claim that recipients have ordered and purchased a one-year subscription for 'Windows Defender Advanced Threat/ Protection Firewall & Network Protection.' Of course, these emails are completely fabricated and the supposed orders are fake. However, the fraudsters rely on users seeing the significant sum of $299.99 that has supposedly been charged to their account and rushing to call the provided phone number to cancel the order. These are typical scheme elements found in many refund, phishing, or technical support tactics. The phone numbers found in the lure messages are presented as official...

Posted on August 12, 2022 in Spam, Phishing

Darkscreen

Darkscreen describes itself as a useful browser extension that will allow users to switch some more simple websites into dark mode even if they do not natively have such functionality. Unfortunately, users will rather quickly learn that Darkscreen also is an adware application. Indeed, the program tries to monetize its presence on users' devices via the generation of unwanted and intrusive advertisements.  The impact of adware and other PUPs (Potentially Unwanted Programs) on the user experience could be significant. More importantly, users could encounter advertisements promoting dubious destinations and products. After all, the advertisements related to adware and other similarly unproven sources are often for hoax websites, phishing...

Posted on August 12, 2022 in Potentially Unwanted Programs, Adware

Entry-system.xyz

Entry-system.xyz is a dubious site that should be approached with caution. The page may try to take advantage of its visitors via various online tactics. Furthermore, it also may cause unwanted redirects to similarly questionable destinations. It also should be pointed out that users are unlikely to willingly open and visit the site. Instead, rogue websites such as this one are mainly encountered as a result of forced redirects, rogue advertising networks, having PUPs (Potentially Unwanted Programs) installed on the devices and other questionable methods. The exact scheme shown by Entry-system.xyz may vary, based on the specific IP address and geolocation of each visitor. The site could try to scare visitors into following its...

Posted on August 12, 2022 in Rogue Websites, Browser Hijackers

Checkmate Ransomware

The Checkmate Ransomware threat possesses the ability to completely lock its victims out of their own data. If executed successfully on the breached devices, the malware will proceed to target a wide range of file types, including any documents, PDFs, archives, databases, photos and more. Typically, ransomware threats utilize military-grade cryptographic algorithms to ensure that all locked files will be virtually impossible to restore without knowing the proper decryption keys. The affected data is then leveraged by the operators of the threat as a way to extort money from the victims. All files locked by the threat will be marked by having '.checkmate' added to their file names. The instructions that the operators of the Checkmate...

Posted on August 12, 2022 in Ransomware

Watch Ransomware

Cybercriminals are leveraging another threatening Dharma ransomware variant to lock the data of their victims. The threat is being tracked as the Watch Ransomware and its impact on the infected devices could be significant. Affected users could be put in a situation where they can no longer access any of their personal or business-related files - documents, archives, databases, PDFs, images, etc. Due to the cryptographic algorithm used in the encryption of the files, restoration of the data is practically impossible without the proper decryption keys. The Watch Ransomware exhibits the typical behavior associated with Dharma variants. The threat will generate an ID string for the specific victim and add it to the names of the locked...

Posted on August 12, 2022 in Ransomware

Dracarys Mobile Malware

Cybercriminals are using a weaponized version of the legitimate messaging application Signal to spread a potent Android spyware threat known as Dracarys. The threat is being primarily leveraged against targets located in India, Pakistan, the UK, and New Zealand. The Dracarys threat was first brought to light in an adversarial threat report released by Meta (formerly Facebook). A more in-depth report on Dracarys was published by researchers. The infosec experts attribute the threat to the Bitter APT (Advanced Persistent Threat) group. The hackers delivered the Dracarys Android malware to their victims' devices via a specially crafted phishing page designed to mimic the legitimate Signal download portal. The used domain was...

Posted on August 11, 2022 in Mobile Malware, Advanced Persistent Threat (APT), Spyware

'Apple Security Center' Scam

Cybersecurity experts are warning users about a rogue website running a technical support tactic consisting of multiple warnings presented as if coming from the 'Apple Security Center.' The untrustworthy page is likely to show several pop-ups filled with seemingly alarming security information. Users may see scan reports (functionality that no website possesses on its own) and numerous threat reports. The fake warnings may claim to be an 'Apple Security Center' alert or 'Apple- Security Warning.' The hoax messages will try to convince users that their Apple device is infected with a Trojan Spyware and as a result has been blocked. After establishing their fake premise and trying to scare unsuspecting users with numerous fake claims of...

Posted on August 11, 2022 in Rogue Websites, Phishing

AdjustableRotator

AdjustableRotator is a dubious program, belonging to the AdLoad adware family. As such, it is likely that its primary function is the delivery of unwanted and annoying advertisements to users' Mac devices. To avoid allowing such intrusive programs onto their computers and devices, users must pay attention when installing any applications from unproven sources. After all, the operators of such PUPs (Potentially Unwanted Programs) often hide them inside software bundles or even completely fake installers/updates. Once fully deployed on the Mac, AdjustableRotator, like other members of the AdLoad family, could be responsible for the appearance of numerous advertisements. Not only will the advertisements diminish the user experience on the...

Posted on August 11, 2022 in Mac Malware, Adware, Potentially Unwanted Programs

Filmedia

Filmedia presents itself to users as a convenient browser extension. The application is supposed to help users find the best streaming service for a movie they would like to watch. Unfortunately, as it becomes obvious rather quickly after installing it, Filmedia also is intrusive adware tasked with the delivery of unwanted and annoying advertisements to the user's device. On the surface level, the suddenly-appearing advertisements could only seem like a mild inconvenience, However, their presence could severely diminish the user experience on the affected device. More importantly, the advertisements themselves could be used as promotional channels for dubious destinations, such as hoax websites, fake giveaways, shady adult-oriented...

Posted on August 11, 2022 in Potentially Unwanted Programs, Adware

Cceo Ransomware

The Cceo Ransomware is a variant from the infamous STOP/Djvu family. Although it lacks any major distinguishing features that set it apart from the other variants of the STOP/Djvu Ransomware family, Cceo's destructive capabilities should not be underestimated. The threat targets a sizeable range of different file types and encrypts them with a strong cryptographic algorithm. Restoration of the affected documents, photos, PDFs, databases, archives, audio and video files, etc. without having the proper decryption keys, is practically impossible. Each encrypted file will have '.cceo' added to its original name as a new extension. The ransomware threat also will create a new text file on the infected systems. Named '_readme.txt,' the role of...

Posted on August 11, 2022 in Ransomware

Captchastate.link

Users who encounter the Captchastate.link website are advised to use caution. First, the site's connection may not be secured. Second, Captchastate.link is likely to try to take advantage of them through various false and misleading messages. Indeed, the site has been confirmed to run a version of a popular browser-based tactic. By pretending that users must pass a CAPTCHA check, the page may try to lure visitors into pressing the shown 'Allow' button and enabling its push notifications unknowingly. It is important to note that many hoax websites such as this one may vary their behavior based on the incoming IP addresses and users' geolocation. As such, the page could show a different false scenario or an entirely different tactic...

Posted on August 11, 2022 in Rogue Websites, Browser Hijackers

Oiltraffic Ransomware

Another potent VoidCrypt variant has been uncovered by cybersecurity experts. Tracked as the Oiltraffic Ransomware, the threat can impact a wide range of different file types and leave them completely unusable. Affected victims will effectively lose their access to any documents, photos, PDFs, archived, databases, audio and video files and more. The attackers behind Oiltraffic demand to be paid a ransom in exchange for providing their victims with a decryption tool that could supposedly restore the data. The main distinguishing feature of Oiltraffic Ransomware from other members of the VoidCrypt Ransomware family can be found in the names of the locked files. The threat adds to them an ID string, an email address, and a new file...

Posted on August 11, 2022 in Ransomware
1 2 3 4 5 6 7 8 9 ... 1796