SpyHunter

Malware Remediation Utility

  • Detect & remove the latest malware threats.
  • Malware detection & removal definitions are updated regularly.
  • Technical support & custom fixes for hard-to-kill malware.

Try SpyHunter (FREE)!*

* Free Remover allows you, subject to a 48-hour waiting period, one remediation and removal for results found. Read our EULA, Privacy Policy & Special Discount Terms. See more Free SpyHunter Remover details.

Top Security News

Cybercriminals Are Still Taking Advantage of Covid-19 with Increased Attacks Microsoft unveiled its Asia Pacific findings from its latest Security Endpoint Threat Report for 2019, which shared that cybercriminals are making 60,000 COVID-19 themed phishing attempts daily....
Infections Abound as Computer Malware Exploiting COVID-19 Coronavirus Spreads Rapidly Adding to Worldwide Hysteria There's no doubt that the Coronavirus has created a worldwide hysteria and pandemic from having a negative impact on many economies to pressing government officials to hold conferences addressing...
Hackers Exploiting Coronavirus Fears To Push Malware As the Covid-19 pandemic goes into full swing, we see increasing numbers of hackers and nation-state actors trying to exploit the global fears for their own gains, spreading malicious software...

Top Articles

WebDiscover Browser

WebDiscover Browser screenshot

WebDiscover Browser is an adware threat developed by a Canada-based company named WebDiscover Media. Once installed on a PC, the malicious app makes a series of unwanted changes to all browsers installed on the computer, leading to a deteriorating online surfing experience. WebDiscover replaces the default home pages and search engines of affected Internet browsers with its own WebDiscover Homepage and WebDiscover Search, respectively. Furthermore, the malicious app modifies the “new tab” settings so that the corrupted browsers launch the malware's own search portal page when the user opens a new tab. Chrome users may not even recognize WebDiscover as an unwanted program and think they...

Posted on July 3, 2015 in Browser Hijackers

How to Fix Mac Error Code 43 When Copying Files

How to Fix Mac Error Code 43 When Copying Files screenshot

Getting an OS system error message while working on a project can be quite an unpleasant surprise. Whether relating to MS Windows, or Mac OS, such a bug is always bound to disrupt your normal computer work. While some errors tend to be system-specific, others can affect both Windows and Mac-based systems, albeit designating totally different problems. The so-called Code 43 error message, for example, is primarily associated with device driver problems in Windows PCs, on the one hand, and file transfer issues on Mac machines, on the other. If you are using Windows and looking for a way to fix this specific error, click here for a guide with possible solutions. If you are a Mac user,...

Posted on January 30, 2019 in Computer Security

APT Attack Spreads Malware Using Coronavirus Theme

APT Attack Spreads Malware Using Coronavirus Theme screenshot

The APT (Advanced Persistent Threat) group was spotted sending out spear-phishing emails that allegedly have detailed information about COVID-19, a.k.a. Coronavirus, but instead, they infect the victims with a custom remote access Trojan (RAT). The group is using the coronavirus pandemic to infect unsuspecting victims with a previously unseen malware. The malware is dubbed 'Vicious Panda' by researchers, with the attackers using it in a campaign at the moment. Researchers managed to find two Rich Text Format (RTF) files that were targeting the Mongolian public sector during the outbreak. Once the files are open, a unique and custom-made remote access Trojan is executed. It develops a list...

Posted on March 16, 2020 in Computer Security

WastedLocker Ransomware

Ransomware threats often target unsuspecting users at random, using different propagation tricks. However, this is not the case with the newly uncovered WastedLocker Ransomware. It would appear that the WastedLocker Ransomware only goes after businesses located in the United States. After security experts studied this new file-locker, they found that it is likely created by the cybercriminals that developed and distributed the notorious Dridex banking Trojan. According to researchers, the con-artists in question have also launched campaigns propagating the BitPaymer Ransomware and the Locky Ransomware. This Week In Malware Ep 13: Evil Corp Hackers Blocked from Deploying WastedLocker Ransomware Recently, authors of ransomware threats have been using a new trick to further pressure their victims into paying the ransom fee. Many...

Posted on June 24, 2020 in Ransomware

Pykw Ransomware

The Pykw Ransomware is a brand-new file-locker that appears to go after users at random. Instead of selecting their victims carefully, the authors of the Pykw Ransomware are trying to propagate this threat as far and wide as possible. The more users it affects, the more likely it is for the Pykw Ransomware creators to generate significant revenue. This new file-locker is a variant of the infamous STOP Ransomware. Propagation and Encryption If you fall victim to the Pykw Ransomware, your system will be scanned and your data located. This is done right before the Pykw Ransomware triggers the encryption process. This nasty Trojan would use a secure encryption algorithm to lock the targeted files. Threats like the Pykw Ransomware usually go after a wide variety of filetypes, which include .mp3, .aac, .midi, .mid, .wav, .mov, .webm, .mp4,...

Posted on June 24, 2020 in Ransomware

IT Ransomware

IT Ransomware is a brand-new data-locking Trojan that appears to be a rather basic project. This file-locker is also known as the CobraLocker Ransomware. Despite not being a very high-end threat, the IT Ransomware is fully capable of causing significant damage to its targets. Unfortunately, the IT Ransomware does not appear to be decryptable for free. Propagation and Encryption Threats like the IT Ransomware often go after a variety of filetypes that are likely to be present on the system of every regular user. This means that the IT Ransomware will not spare any images, documents, presentations, databases, spreadsheets, archives, audio files, videos and other filetypes that are common. As a result of an attack by the IT Ransomware, the majority of your data will be encrypted with a secure encryption algorithm. Every file that gets...

Posted on July 9, 2020 in Ransomware

Top 20 Countries Found to Have the Most Cybercrime

Have you ever wondered which countries face the most cybercrime? If you have ever wondered which countries have the most cybercrime, then you may be surprised to know that there are few contributing factors that attract cybercriminals to specific regions of the world. Security research firm, Symantec, has discovered specific factors that determine why a certain country is plagued with cybercrime more so or less than another which allowed them to come up with a ranking for each. Symantec has ranked 20 countries that face, or cause, the most cybercrime. In compiling such a list, Symantec was able to quantify software code that interferes with a computer's normal functions, rank zombie systems, and observe the number of websites that host phishing sites, which are designed to trick computer users into disclosing personal data or banking...

Posted on July 9, 2009 in Computer Security

Top 5 Popular Cybercrimes: How You Can Easily Prevent Them

Over the course of the past few years, hackers and cybercrooks armed with sophisticated malware have stolen literally hundreds of millions of dollars from online banking accounts and individuals all over the world. We have said it many times before in recent articles, the days of robbing banks in person are gone and now it all takes place behind a screen of a computer connected to the Internet. The Internet can be the most useful tool in business, school or every-day life. At the same time, the Internet can make someone's life a living hell in the event that one becomes the next victim of a cybercrime. A large percentage of the world's population that uses computers over the Internet are aware of cybercrime and the consequences that they may face if they succumb to a cybercriminals' trap. Others who have no clue as to the dangers they...

Posted on October 12, 2010 in Computer Security

AntiMalware

AntiMalware screenshot

A typical deceptive campaign is disguising harmful threats as legitimate security programs in order to steal money from inexperienced victims. AntiMalware is a particularly short-named version of this campaign, with clones with names such as Active Security and Total Security. AntiMalware uses an interface that is very similar to the Windows Defender and legitimate Microsoft security programs, to make the victim believe that AntiMalware is a legitimate anti-malware application. Observing AntiMalware's design, you will quickly spot authentic-looking Windows and Microsoft Security Essentials logos as well as a layout that may seem familiar to most users of legitimate Microsoft Security...

Posted on November 9, 2009 in Rogue Anti-Spyware Program

More Articles

Plasminori.club

When someone creates a website that has only the objective of generating monetary gain, these people will not waste their time trying to have content that will make users visit it. What they do to convince as many computer users they can to do whatever it takes for them to achieve their objective is to use misleading tactics hoping that gullible computer users will fall for their trap. Some of them advertise themselves as containing useful content, others offer fancy-free stuff, and Plasminori.club, which is this website kind, uses a message to try to convince you to permit him to send notifications to your Web browser directly. The message contains a prompt asking you to click 'Allow' to pass an anti-robot check. However, the real intent of the 'Allow' button is to subscribe you to Plasminori.club's notifications. If you already gave...

Posted on August 6, 2020 in Browser Hijackers

Limitaterer.club

If you see some pop-ups displayed by a website named Limitaterer.club when browsing the Internet, this may mean that you are visiting corrupted websites that support Limitaterer.club. These pop-ups will ask you to click a button called 'Allow' and justify the request saying that this is a way to certify that you are human, not a robot. However, this is not what will happen if you click the 'Allow' button. The result will be that it will make you a subscriber to the Limitaterer.club notifications. However, giving Limitaterer.club the asked permission, Limitaterer.club will deliver an enormous number of sponsored advertisements that may cover parts of the content you are trying to read. Although the notifications displayed by Limitaterer.club are not unsafe, it is not recommended to access their contents since they may sometimes take you...

Posted on August 6, 2020 in Browser Hijackers

Deadfiles Ransomware

The Deadfiles Ransomware is a newly discovered crypto locker malware that, according to the security experts who analyzed its code is part of the MedusaLocker Ransomware family. The Deadfiles Ransomware operates as a typical ransomware threat. After infiltration, it encrypts the locally stored files using secure AES + RSA encryptions and demands ransom payment for their restoration. All encrypted files will have their original names changed to include ".deadfiles" as a new extension. In every folder containing encrypted files, the Deadfiles Ransomware drops a file named "Recovery_Instructions.html" containing the text of the ransom note.  Victims of the Deadfiles Ransomware are instructed to use the TOR browser to open a URL link provided in the ransom note as a means of communication with hackers. Only if the URL doesn't work, they...

Posted on August 6, 2020 in Ransomware

OutCrypt Ransomware

The OutCrypt Ransomware belongs to the crypto locker family of malware threats, but due to some of the rather weird characteristics of the version detected by cybersecurity experts, it may be considered to either be incomplete or in a test phase. Unfortunately, for the victims of this nasty piece of malware, that doesn't mean that they will be able to recover their files easily. Once OutCrypt Ransomware infiltrates the user's computer, it will start encrypting the most common file types with a strong encryption algorithm, which renders them inaccessible. The OutCrypt Ransomware targets image, video, audio, pdf, ppt, css, xlx, html, text, document, and database files, and adds "_out" as a new extension to their original names. While one of the main intent of every ransomware threat out there is to remain hidden while it carries out it's...

Posted on August 6, 2020 in Ransomware

Ursnif Trojan

Ursnif Trojan is a sneaky threat that may end up on a Windows PC where it may infiltrate the system in a way to overtake certain functions and then carry out malicious activities often without the computer user become aware of the issue. The Ursnif Trojan horse may propagate after a user ends up on certain websites or has unknowingly downloaded malicious files. The process of spreading for Ursnif Trojan could render from fake flash player downloads or even adware applications that are loaded with the installation of freeware or bundled software apps. Other cases of Ursnif Trojan spreading are through aggressive spam email campaigns. The spam campaigns that spread Ursnif Trojan pay present users with downloads or attachments that the message claims are essential. IN other cases, the spam messages may make bogus claims of a shipment...

Posted on August 6, 2020 in Trojans

ChinaJm Ransomware

The ChinaJm Ransomware uses AES and RSA encryption to encrypt the files stored on the infected machine and then uses scary tactics to extort money from the affected user in exchange for the restoration of the affected files. Although the ChinaJm Ransomware targets English and Chinese-based users, mainly, it can spread across the world without any problems. Unfortunately, due to the strong encryption, it may be impossible to create a free decryptor unless there is some serious flaw or bug in the underlying code of this malware threat. The victims of ChinaJm Ransomware will notice that their files are no longer usable, and the original names have been changed to now contain a ".china" extension. A text file containing a unique ID and a few text lines will be dropped after the encryption process has completed. The name of the file is...

Posted on August 6, 2020 in Ransomware

LOLSnif

When the source code of a piece of malware gets released, it enables all sorts of hackers, from those that possess lesser technical skills to the highly proficient ones, just to take it and repurpose it for their specific needs. This is precisely the case with LOLSnif, a malware that is based on the Ursnif banking Trojan but has been modified with expanded functions heavily and turned into a VBS malware dropper. LOLSnif has been detected as part of several attack campaigns, and looking into its inner workings could turn out to be quite significant. As an infiltration method, LOLSnif employs phishing emails carrying an encrypted ZIP file with the code for its decryption written in the body of the email. When the victim attempts to unpack the corrupted file, LOLSnif activates and starts the infection process. Its first action is to carry...

Posted on August 6, 2020 in Malware

ConnectionIndexer

Mac users may be obliged to deal with a Potentially Unwanted Program (PUP) named ConnectionIndexer if, when downloading free programs from the third-parties, do not read the Terms and Condition linked to the download. Although not threatening, ConnectionIndexer may make some changes to your browser settings and system that may end up causing some unwanted problems. Once inside your computer, ConnectionIndexer will configure Safe Finder as your Web browser. Although Safe Finder is not considered unsafe and will not cause any harm to your privacy or the security of your computer, the search results you will receive may not be as accurate as the ones provided by Google, Mozilla Firefox, Safari, Internet Explorer, Chrome, etc. Looks like that the main distribution method used by ConnectionIndexer is a fake Adobe Flash Player update....

Posted on August 6, 2020 in Mac Malware

Nignrecentry.club

The Nignrecentry.club is a website that uses an elaborate tactic, which consists of hijack the Web browser notifications of its victims. Although this browser hijacking is not a danger to the users' privacy or the machine's safety, the actions that will be performed by Nignrecentry.club can disturb the Web browsing and become inconvenient. The tactic used by Nignrecentry.club to carry out its intent is to ask the computer users to attest that they are not robots by clicking 'Allow.' However, the true purpose of this is that, by clicking the 'Allow' button, they will subscribe to Nignrecentry.club's notifications. It is there that starts the problem: if Nignrecentry.club is allowed to use the notifications, it will start delivering countless paid advertisements that advertise dubious products and services. By clicking on the...

Posted on August 6, 2020 in Browser Hijackers

Online Radio Finder Tab

The Online Radio Finder Tab claims to offer users a quick and convenient way to access popular radio providers right from the new page tab. Furthermore, it will provide users with convenient links to most shopping and social sites. The truth, however, is that the Online Radio Finder Tab is a Possibly Unwanted Program (PUP) and a browser hijacker that will change your default browser settings to promote a fake search engine. Users may come in contact with the Online Radio Finder Tab in two ways. One is as a browser extension, that, if installed, will set the homepage, new page tab, and the default search engine to search.honlineradiofinder.com. Experts classify such search engines as fake because they do not display search results on their own and instead redirect the search query of the user through one of the established search...

Posted on August 5, 2020 in Potentially Unwanted Programs

Life Radio Pro Tab

The Life Radio Pro Tab is classified as a browser hijacker and a PUP ( Potentially Unwanted Program). The Life Radio Pro Tab has the ability to modify the default settings of the user's Web browser. Unlike most other programs of the same type, Life Radio Pro Tab actually has two separate versions - one is a browser extension while the other is an entire browser based on Chromium. However, both versions' goal is the same, mainly to promote a fake search engine and display sponsored content. If you have the browser extension version of the Life Radio Pro Tab, you may notice that the default homepage and the new page tab of your browser have suddenly been changed to open search.tliveradiopro.com. The default search engine also will be changed to search.tliveradiopro.com. This means that any search queries conducted by the user will be...

Posted on August 5, 2020 in Potentially Unwanted Programs

'FBI CRIMINAL INVESTIGATION' Pop-Up Scam

The 'FBI CRIMINAL INVESTIGATION' pop-up scam is categorized as a social engineering tactic that attempts to scare the unsuspecting users and force them to send money to the fraudsters disguised as professional fees or fines. As its name suggests, 'FBI CRIMINAL INVESTIGATION' pop-up scam claims that the FBI has locked the user's device due to restricted material being found on it. The tactic mentions that the content may be related to child pornography, child abuse, zoophilia pornography, and bulk-spamming specifically and that such content violates US federal law, specifically articles 161, 148, 215, 301. Users are instructed that to unlock the device, they should pay the required fees within 24 hours. If 48 hours have elapsed without any payment, an arrest warrant is going to be issued for the user. While it may sound frightening at...

Posted on August 5, 2020 in Adware

CCHH Ransomware

The CCHH Ransomware is classified as a ransomware threat, which means that this piece of malware infiltrates the computer systems of its victims, encrypts the stored files by using strong encryption and then demands money for their restoration. According to cybersecurity experts who have analyzed the underlying code of the threat, the CCHH Ransomware is not a unique variant, and instead, it belongs to the GlobeImposter Ransomware family. What sets the CCHH Ransomware apart is the specific ".CCHH" extension that it appends to the end of every successfully encrypted file. This means that if the file had an original name of "picture1.png," it will be renamed to "picture1.png.CCHH". A file named "Decryptin INFO.html" containing the text of the ransom note will be dropped by CCHH Ransomware in every folder with encrypted files in it.  The...

Posted on August 5, 2020 in Ransomware

Silvertor Ransomware

The Silvertor Ransomware belongs to the ransomware family of malware threats. It aims to sneak onto the victim's computer and then uses secure encryption to lock the files stored on it effectively and render them unusable. The criminals then demand the payment of a specific sum to provide the decryption key necessary for the restoration of the files. The Silvertor Ransomware appends the extension ".silvertor" to the end of the original name of every successfully encrypted file. In addition, a ransom note is dropped as a file named "README.html," which is opened every time the system is restarted automatically. The Silvertor Ransomware also generates a pop-up window with text different from the one in the file on every system restart. The criminals behind Silvertor Ransomware demand $250 from their victims that should be paid in Bitcoin...

Posted on August 5, 2020 in Ransomware

1dec Ransomware

Despite already having countless variants released in the wild, the Dharma Ransomware appears to still be as popular as ever with cybersecurity researchers continuing to detect more and more newly released ransomware threats based on it. The latest one is called 1dec Ransomware. As is generally the case, the only significant difference between the 1dec Ransomware and the rest of the threats belonging to the Dharma Ransomware family is the extension used for the encrypted files and the email addresses provided by the hackers. The 1dec Ransomware doesn't deviate from the standard behavior expected from a ransomware threat. The 1dec Ransomware attempts to infiltrate the victim's computer, most likely through spam emails carrying infected files as attachments, after which it starts encrypting the files stored on the machine. If the...

Posted on August 5, 2020 in Ransomware
1 2 3 4 5 6 7 8 9 10 11 1,481