SpyHunter

Malware Remediation Utility

  • Detect & remove the latest malware threats.
  • Malware detection & removal definitions are updated regularly.
  • Technical support & custom fixes for hard-to-kill malware.

Try SpyHunter (FREE)!*

* Free Remover allows you, subject to a 48-hour waiting period, one remediation and removal for results found. Read our EULA, Privacy Policy & Special Discount Terms. See more Free SpyHunter Remover details.

Top Security News

Cybercriminals Are Still Taking Advantage of Covid-19 with Increased Attacks Microsoft unveiled its Asia Pacific findings from its latest Security Endpoint Threat Report for 2019, which shared that cybercriminals are making 60,000 COVID-19 themed phishing attempts daily....
Infections Abound as Computer Malware Exploiting COVID-19 Coronavirus Spreads Rapidly Adding to Worldwide Hysteria There's no doubt that the Coronavirus has created a worldwide hysteria and pandemic from having a negative impact on many economies to pressing government officials to hold conferences addressing...
Hackers Exploiting Coronavirus Fears To Push Malware As the Covid-19 pandemic goes into full swing, we see increasing numbers of hackers and nation-state actors trying to exploit the global fears for their own gains, spreading malicious software...

Top Articles

WebDiscover Browser

WebDiscover Browser screenshot

WebDiscover Browser is an adware threat developed by a Canada-based company named WebDiscover Media. Once installed on a PC, the malicious app makes a series of unwanted changes to all browsers installed on the computer, leading to a deteriorating online surfing experience. WebDiscover replaces the default home pages and search engines of affected Internet browsers with its own WebDiscover Homepage and WebDiscover Search, respectively. Furthermore, the malicious app modifies the “new tab” settings so that the corrupted browsers launch the malware's own search portal page when the user opens a new tab. Chrome users may not even recognize WebDiscover as an unwanted program and think they...

Posted on July 3, 2015 in Browser Hijackers

How to Fix Mac Error Code 43 When Copying Files

How to Fix Mac Error Code 43 When Copying Files screenshot

Getting an OS system error message while working on a project can be quite an unpleasant surprise. Whether relating to MS Windows, or Mac OS, such a bug is always bound to disrupt your normal computer work. While some errors tend to be system-specific, others can affect both Windows and Mac-based systems, albeit designating totally different problems. The so-called Code 43 error message, for example, is primarily associated with device driver problems in Windows PCs, on the one hand, and file transfer issues on Mac machines, on the other. If you are using Windows and looking for a way to fix this specific error, click here for a guide with possible solutions. If you are a Mac user,...

Posted on January 30, 2019 in Computer Security

APT Attack Spreads Malware Using Coronavirus Theme

APT Attack Spreads Malware Using Coronavirus Theme screenshot

The APT (Advanced Persistent Threat) group was spotted sending out spear-phishing emails that allegedly have detailed information about COVID-19, a.k.a. Coronavirus, but instead, they infect the victims with a custom remote access Trojan (RAT). The group is using the coronavirus pandemic to infect unsuspecting victims with a previously unseen malware. The malware is dubbed 'Vicious Panda' by researchers, with the attackers using it in a campaign at the moment. Researchers managed to find two Rich Text Format (RTF) files that were targeting the Mongolian public sector during the outbreak. Once the files are open, a unique and custom-made remote access Trojan is executed. It develops a list...

Posted on March 16, 2020 in Computer Security

WastedLocker Ransomware

Ransomware threats often target unsuspecting users at random, using different propagation tricks. However, this is not the case with the newly uncovered WastedLocker Ransomware. It would appear that the WastedLocker Ransomware only goes after businesses located in the United States. After security experts studied this new file-locker, they found that it is likely created by the cybercriminals that developed and distributed the notorious Dridex banking Trojan. According to researchers, the con-artists in question have also launched campaigns propagating the BitPaymer Ransomware and the Locky Ransomware. This Week In Malware Ep 13: Evil Corp Hackers Blocked from Deploying WastedLocker Ransomware Recently, authors of ransomware threats have been using a new trick to further pressure their victims into paying the ransom fee. Many...

Posted on June 24, 2020 in Ransomware

Pykw Ransomware

The Pykw Ransomware is a brand-new file-locker that appears to go after users at random. Instead of selecting their victims carefully, the authors of the Pykw Ransomware are trying to propagate this threat as far and wide as possible. The more users it affects, the more likely it is for the Pykw Ransomware creators to generate significant revenue. This new file-locker is a variant of the infamous STOP Ransomware. Propagation and Encryption If you fall victim to the Pykw Ransomware, your system will be scanned and your data located. This is done right before the Pykw Ransomware triggers the encryption process. This nasty Trojan would use a secure encryption algorithm to lock the targeted files. Threats like the Pykw Ransomware usually go after a wide variety of filetypes, which include .mp3, .aac, .midi, .mid, .wav, .mov, .webm, .mp4,...

Posted on June 24, 2020 in Ransomware

IT Ransomware

IT Ransomware is a brand-new data-locking Trojan that appears to be a rather basic project. This file-locker is also known as the CobraLocker Ransomware. Despite not being a very high-end threat, the IT Ransomware is fully capable of causing significant damage to its targets. Unfortunately, the IT Ransomware does not appear to be decryptable for free. Propagation and Encryption Threats like the IT Ransomware often go after a variety of filetypes that are likely to be present on the system of every regular user. This means that the IT Ransomware will not spare any images, documents, presentations, databases, spreadsheets, archives, audio files, videos and other filetypes that are common. As a result of an attack by the IT Ransomware, the majority of your data will be encrypted with a secure encryption algorithm. Every file that gets...

Posted on July 9, 2020 in Ransomware

Top 20 Countries Found to Have the Most Cybercrime

Have you ever wondered which countries face the most cybercrime? If you have ever wondered which countries have the most cybercrime, then you may be surprised to know that there are few contributing factors that attract cybercriminals to specific regions of the world. Security research firm, Symantec, has discovered specific factors that determine why a certain country is plagued with cybercrime more so or less than another which allowed them to come up with a ranking for each. Symantec has ranked 20 countries that face, or cause, the most cybercrime. In compiling such a list, Symantec was able to quantify software code that interferes with a computer's normal functions, rank zombie systems, and observe the number of websites that host phishing sites, which are designed to trick computer users into disclosing personal data or banking...

Posted on July 9, 2009 in Computer Security

Top 5 Popular Cybercrimes: How You Can Easily Prevent Them

Over the course of the past few years, hackers and cybercrooks armed with sophisticated malware have stolen literally hundreds of millions of dollars from online banking accounts and individuals all over the world. We have said it many times before in recent articles, the days of robbing banks in person are gone and now it all takes place behind a screen of a computer connected to the Internet. The Internet can be the most useful tool in business, school or every-day life. At the same time, the Internet can make someone's life a living hell in the event that one becomes the next victim of a cybercrime. A large percentage of the world's population that uses computers over the Internet are aware of cybercrime and the consequences that they may face if they succumb to a cybercriminals' trap. Others who have no clue as to the dangers they...

Posted on October 12, 2010 in Computer Security

AntiMalware

AntiMalware screenshot

A typical deceptive campaign is disguising harmful threats as legitimate security programs in order to steal money from inexperienced victims. AntiMalware is a particularly short-named version of this campaign, with clones with names such as Active Security and Total Security. AntiMalware uses an interface that is very similar to the Windows Defender and legitimate Microsoft security programs, to make the victim believe that AntiMalware is a legitimate anti-malware application. Observing AntiMalware's design, you will quickly spot authentic-looking Windows and Microsoft Security Essentials logos as well as a layout that may seem familiar to most users of legitimate Microsoft Security...

Posted on November 9, 2009 in Rogue Anti-Spyware Program

More Articles

Online Radio Finder Tab

The Online Radio Finder Tab claims to offer users a quick and convenient way to access popular radio providers right from the new page tab. Furthermore, it will provide users with convenient links to most shopping and social sites. The truth, however, is that the Online Radio Finder Tab is a Possibly Unwanted Program (PUP) and a browser hijacker that will change your default browser settings to promote a fake search engine. Users may come in contact with the Online Radio Finder Tab in two ways. One is as a browser extension, that, if installed, will set the homepage, new page tab, and the default search engine to search.honlineradiofinder.com. Experts classify such search engines as fake because they do not display search results on their own and instead redirect the search query of the user through one of the established search...

Posted on August 5, 2020 in Potentially Unwanted Programs

Life Radio Pro Tab

The Life Radio Pro Tab is classified as a browser hijacker and a PUP ( Potentially Unwanted Program). The Life Radio Pro Tab has the ability to modify the default settings of the user's Web browser. Unlike most other programs of the same type, Life Radio Pro Tab actually has two separate versions - one is a browser extension while the other is an entire browser based on Chromium. However, both versions' goal is the same, mainly to promote a fake search engine and display sponsored content. If you have the browser extension version of the Life Radio Pro Tab, you may notice that the default homepage and the new page tab of your browser have suddenly been changed to open search.tliveradiopro.com. The default search engine also will be changed to search.tliveradiopro.com. This means that any search queries conducted by the user will be...

Posted on August 5, 2020 in Potentially Unwanted Programs

'FBI CRIMINAL INVESTIGATION' Pop-Up Scam

The 'FBI CRIMINAL INVESTIGATION' pop-up scam is categorized as a social engineering tactic that attempts to scare the unsuspecting users and force them to send money to the fraudsters disguised as professional fees or fines. As its name suggests, 'FBI CRIMINAL INVESTIGATION' pop-up scam claims that the FBI has locked the user's device due to restricted material being found on it. The tactic mentions that the content may be related to child pornography, child abuse, zoophilia pornography, and bulk-spamming specifically and that such content violates US federal law, specifically articles 161, 148, 215, 301. Users are instructed that to unlock the device, they should pay the required fees within 24 hours. If 48 hours have elapsed without any payment, an arrest warrant is going to be issued for the user. While it may sound frightening at...

Posted on August 5, 2020 in Adware

CCHH Ransomware

The CCHH Ransomware is classified as a ransomware threat, which means that this piece of malware infiltrates the computer systems of its victims, encrypts the stored files by using strong encryption and then demands money for their restoration. According to cybersecurity experts who have analyzed the underlying code of the threat, the CCHH Ransomware is not a unique variant, and instead, it belongs to the GlobeImposter Ransomware family. What sets the CCHH Ransomware apart is the specific ".CCHH" extension that it appends to the end of every successfully encrypted file. This means that if the file had an original name of "picture1.png," it will be renamed to "picture1.png.CCHH". A file named "Decryptin INFO.html" containing the text of the ransom note will be dropped by CCHH Ransomware in every folder with encrypted files in it.  The...

Posted on August 5, 2020 in Ransomware

Silvertor Ransomware

The Silvertor Ransomware belongs to the ransomware family of malware threats. It aims to sneak onto the victim's computer and then uses secure encryption to lock the files stored on it effectively and render them unusable. The criminals then demand the payment of a specific sum to provide the decryption key necessary for the restoration of the files. The Silvertor Ransomware appends the extension ".silvertor" to the end of the original name of every successfully encrypted file. In addition, a ransom note is dropped as a file named "README.html," which is opened every time the system is restarted automatically. The Silvertor Ransomware also generates a pop-up window with text different from the one in the file on every system restart. The criminals behind Silvertor Ransomware demand $250 from their victims that should be paid in Bitcoin...

Posted on August 5, 2020 in Ransomware

1dec Ransomware

Despite already having countless variants released in the wild, the Dharma Ransomware appears to still be as popular as ever with cybersecurity researchers continuing to detect more and more newly released ransomware threats based on it. The latest one is called 1dec Ransomware. As is generally the case, the only significant difference between the 1dec Ransomware and the rest of the threats belonging to the Dharma Ransomware family is the extension used for the encrypted files and the email addresses provided by the hackers. The 1dec Ransomware doesn't deviate from the standard behavior expected from a ransomware threat. The 1dec Ransomware attempts to infiltrate the victim's computer, most likely through spam emails carrying infected files as attachments, after which it starts encrypting the files stored on the machine. If the...

Posted on August 5, 2020 in Ransomware

WatchCat

WatchCat is a freshly created piece of malware that has as it targets Mac computers. Thankfully, malware researchers encountered WatchCat on an online file scanning service only, and no working copies of the WatchCat insert have been found. After an in-depth analysis of the WatchCat, malware experts concluded that WatchCat is not related to any of the countless malware families focused on the macOS. There are not too many known elements about the WatchCat insert, but malware analysts there are some hints pointing the WatchCat malware as one of the threatening tools used by the Lazarus APT because this infamous group seems to be expanding its activities, which were focused on Windows OSes, to crate malware targeting the macOS – recently, they launched OSX.Casso, a backdoor Trojan that is focused on Mac computers. As we said before,...

Posted on August 5, 2020 in Mac Malware

OSX.Casso

The myth that the macOS system is immune to malware infections has fallen as more and more macOS threats, adware, and Potentially Unwanted Programs (PUPs) targeting it are growing uncontrollably. Among these pests is a backdoor Trojan that was named OSX.Casso. Security researchers believe that it was developed and now used by a North Korea-based cybercrime group, the infamous Lazarus APT group. The OSX.Casso backdoor is not significant in size. After analyzing working samples of the OSX.Casso, malware researchers concluded that less than half of the file, 32KB, is in charge of the harmful activity it executes. However, the size of the file was increased artificially by its developers when they added junk code and content, which may fool anti-malware products. The OSX.Casso does not have outstanding functionality because the macOS has...

Posted on August 5, 2020 in Mac Malware

Fsintervice.club

Fsintervice.club is an unsafe website that displays misleading alerts and pop-ups informing the users that they can access its content as soon as they finish a mandatory anti-robot test. To make its allegations more believable, Fsintervice.club uses some of the icons and design features of the numerous test 'CAPTCHA' used online. However, you should remember that all Fsintervice.club justifications are fake, and believing them will not make you prove that you are not a machine. Instead, the goal of Fsintervice.club is to force you to subscribe to Fsintervice.club notifications. There's no motive to be worried if you already subscribed to Fsintervice.club notifications since Fsintervice.club will not cause any harm with these permissions. However, what is worrying is that the Fsintervice.club can explore your Web browser's notifications...

Posted on August 4, 2020 in Browser Hijackers

Montances.club

Montances.club is a webpage that uses a very simple browser-based tactic. Montances.club will not ask the computer users to download any application or provide information. However, they will be asked to click a button saying 'Allow.' Obviously, the page does not disclose the true intention of this action. Instead, it will inform its visitors that this action is required to pass a human verification test. However, what the 'Allow' button that Montances.club wants you to click serves the purpose of making a subscription to Montances.club's notifications. If you get curious and press the 'Allow' button, Montances.cluby will start displaying countless notifications. The negative aspect of these notifications is that they may advertise suspicious sites, unsafe software and other online unwanted content. Malware experts recommend computer...

Posted on August 4, 2020 in Browser Hijackers

Riodovernprovi.club

Riodovernprovi.club is a webpage that may appear in your browser out of nowhere. Riodovernprovi.club may be advertised via low-quality Web pages related to the distribution of software activators, pirated media, game cracks, and other potentially unsafe content. The page Riodovernprovi.club delivers various pop-ups and messages that will try to convince you that you should subscribe to its notifications. There are various ways that Riodovernprovi.club can use to achieve this goal. However, the most popular of these tactics os one that asks the computer users to validate that they are persons, not machines, by pressing the button 'Allow' that will be displayed on their desktops. However, the button 'Allow' is used to provide Serwrities.club's with permission to show its notifications. Some users may subscribe to the Serwrities.club...

Posted on August 4, 2020 in Browser Hijackers

Preadyaggrego.club

Preadyaggrego.club is a misleading website that sends alerts and warnings intended to make the computer users believe that they need to go by an anti-robot test to access the content they want to see. However, following the instructions provided by Preadyaggrego.club will lead to an entirely different result – the computer user will be subscribed to the notifications that Preadyaggrego.club wants do display. These are not significant changes and will not cause any harm. However, the notifications from Preadyaggrego.club may become a problem because their objective is to show advertisements. The Preadyaggrego.club notifications may promote affiliate products/services, shady Web destinations, tactics, blog posts and even inconvenient content. Computer users that are dealing with unwanted notifications from Preadyaggrego.club or another...

Posted on August 4, 2020 in Browser Hijackers

Nraddramatica.club

Computer users that see a site named Nraddramatica.club may become a victim of a well-used social engineering scheme. The Nraddramatica.club site will display pop-up notifications trying to induce unsuspecting users to subscribe to its alerts, promising them some advantage. Nraddramatica.club may use a tactic known as 'Click here to prove you are not a robot.' These unwanted websites exhibit these notifications to trick users into allowing Nraddramatica.club to display as many notifications it wants. If the PC users decide to allow it, Nraddramatica.club will use its privileges to spam the users with a flood of unwanted advertisements by using their browser. These advertisements may become a nuisance since they may cover parts of the content of the websites the users are trying to read. Even when the browser is disabled, the...

Posted on August 4, 2020 in Browser Hijackers

Agendant.club

Users who land on Agendant.club may soon fall victim to a social engineering tactic. The website will generate pop-up notifications tempting the unsuspecting users to subscribe to its alerts for some vague benefit, or it may even try to trick them through a 'Click here to prove you are not a robot' message. No matter what the actual text is, the goal of these notifications is to trick the users into giving Agendant.club push notification permissions. If allowed, Agendant.club will then abuse its privileges to spam the user with a stream of unwanted advertisements directly in the browser. The advertisements may even start covering up some of the content of the websites. Even closing the browser altogether will not mitigate the influx of advertisements. While these social tactics are not that unsafe, clicking on any of the advertisements...

Posted on August 4, 2020 in Browser Hijackers

Сompanice.club

Companice.club is a fake website that uses social engineering tricks to fool the user into giving it permission to show push notifications. The result of this is that anyone who falls for it will now experience a stream of unsolicited advertisements being displayed into their browser directly. Companice.club will have sufficient permissions so that even if the user decides to close their browser, that will not stop the pop-up advertisements from being generated on their screen. Users are strongly advised not to subscribe to any alerts offered by Companice.club. They shouldn't click on any of the notification messages displayed on the website, either. One possible notification displayed by Companice.club is: Сompanice.club wants to Show notifications Please Press Allow to Continue Watch! The site also may claim that users should click...

Posted on August 4, 2020 in Browser Hijackers
1 2 3 4 5 6 7 8 9 10 11 1,480