Zeus Trojan

Zeus Trojan screenshot

The Zeus Trojan is the most widespread and common banking Trojan today. There are countless variants of the Zeus Trojan, also known as Zbot and Zitmo. There are regional variants that target computers in specific areas of the world as well as mobile-specific variants designed to attack mobile operating systems such as Android or BlackBerry platforms. In all cases, the Zeus Trojan is used to steal banking information. This dangerous malware infection can be used to steal account names and numbers, banking account passwords, and credit card numbers. The Zeus Trojan can also be utilized to capture particular information that can then be used to steal a victim's identity. ESG security...

Posted on March 27, 2006 in Trojans

AGM65s Keylog trojan

AGM65s Keylog trojan is a keylogger and dangerous computer parasite that can compromise personal information. AGM65s Keylog trojan is able to log data from online activity and then send the recorded information to a designated ftp location. AGM65s Keylog trojan is able to be installed from a backdoor without knowledge to the computer user. AGM65s Keylog trojan should be detected and safely removed through an anti-spyware tool.

Posted on March 27, 2006 in Keyloggers


Sality is a sophisticated, complex and extremely dangerous computer virus. If you have any hint that your PC got infected with Sality, you should act with caution and deal with Sality as quickly as humanly possible. Sality can be harmful to your computer and to you in a startling variety of ways, because Sality includes features or components of every major kind of malware and regularly changes itself, continuously becoming more malicious and harder to detect than it was before. Sality's History The Sality virus first appeared in Russia in 2003. Since then, Sality has continued to be a threat, and Sality has spread throughout the world, historically with an especially strong presence in Brazil. Sality was one of the most prevalent viruses of 2010, and there was a major increase in the number of infections at the end of the year, when a...

Posted on March 26, 2006 in Viruses

PC MightyMax

PC MightyMax is a fake registry cleaner that has been around since 2006. Since then, the criminals behind this bogus registry cleaner have released 'new' versions of PC MightyMax, such as PC MightyMax 2009 and PC MightyMax 2010. Make no mistake about it; PC MightyMax has no way of fixing your computer or cleaning your registry. Rather, PC MightyMax is a rogue security application, a fake security program that pretends to protect your computer from malware in order to steal your money. Promoted at the website PCMightyMax.net, PC MightyMax is a threat to inexperienced computer users. While PC MightyMax is problematic, more advanced rogue security programs have appeared since PC MightyMax's heyday. This means that most security applications are well-equipped to handle this bogus security program. In fact, PC MightyMax can even be removed...

Posted on March 13, 2006 in Rogue Registry Cleaner


NetTrojan is a Trojan released in 2002 and allows a third party to gain access to your computer. This dangerous infection was regularly updated until 2007. NetTrojan is what is known as a Remote Administration Tool or ART. At first, Remote Administration Tools were benign programs designed to allow their owners to control their own computers from afar. However, hackers soon adapted Remote Administration Tools to work together with Trojans. In this way, NetTrojan can enter your computer and create a passageway through which a criminal can gain access to your computer. Known versions of NetTrojan can infect most Windows operating systems up to Windows XP. Computers running Windows Vista or Windows 7 are probably safe from a classic NetTrojan infection.   NetTrojan Can Be Very Difficult to Detect The criminals behind NetTrojan have...

Posted on January 9, 2006 in Trojans

Reflections on Spyware and File Sharing Programs

Just a quick note on spyware and file sharing applications. In the spyware world, many file sharing programs are amongst the worst of the infectors! Kazaa Media Desktop, iMesh, LimeWire, BearShare, and Grokster are known to install parasites and spyware. This is how they are able to offer a FREE program to the public. It is more than likely that, even after the spyware programs are removed by Enigma SpyHunter, the culprit will continue to re-install parasites. To prevent this, you should uninstall the offending file sharing program. After you uninstall these spyware-generating file sharing programs, it is CRUCIAL to run the SpyHunter remover once again, to clean up any spyware traces that may have been left on your system. There are several excellent file sharing programs, similar to Kazaa and iMesh that are free, and contain NO...

Posted on December 26, 2005 in Product FAQ


Vundo is an extremely dangerous Trojan, and Vundo has the potential to be extremely destructive. Often, the only thing you can do is protect your computer from getting Vundo in the first place, by taking proper preventative measures. Once Vundo has infected your PC, it may be impossible to remove, depending on which version of the Trojan is causing the infection. Vundo is also known as MS Juan, Virtumonde, and Virtumundo. How Can You Tell if Vundo has Infected Your Computer? Depending on which variety of Vundo infects your PC, you may or may not notice any symptoms. Primarily, Vundo's purpose is to generate advertisements, which usually promote fake anti-virus software such as WinFixer, AntiVirus 2009, AntiSpywareMaster, SysProtect, and WinAntiSpyware, WinAntiVirus, System Doctor, and Drive Cleaner, among others. Therefore, it is...

Posted on November 29, 2005 in Trojans

How to Proceed if you Cannot Uninstall the Old PopupStop Software

If you are experiencing problems uninstalling the old Popup Blocker when you upgrade SpyHunter, follow the instructions below to fix the uninstall problem. First click on the following link (or paste it into your browser): http://enigmasoftwaregroup.com/Spyhunter_secure_download/PopupStop.exe Next, you will be prompted for a username and password. When prompted, enter your email address as the username, and whatever password you registered with us in the password field. This should allow you to directly download the "PopupStop.exe" executable installation file. We strongly recommend that you save this to your desktop so that you can easily locate it for the installation (please make a note of where you save this file as you will need it to complete installation). When the download has completed, locate the file "PopupStop.exe" and...

Posted on September 26, 2005 in Product FAQ


SpySheriff is a fraudulent anti-spyware application that is designed by devious hackers to profit from credible computer users. SpySheriff may be brought into your computer by a Trojan through browser security cracks, or may be downloaded directly from www.spysheriff.com. SpySheriff has the ability to generate false warning messages that appear in your taskbar. These fake messages are produced after a "scan" that SpySheriff emulates to raise its credibility. After SpySheriff "detects" parasites on your computer, it will continuously offer you to purchase the full version of the program, in order to dispose of the non-existent threats. Immediate removal of SpySheriff is strongly recommended.

Posted on June 24, 2005 in Rogue Anti-Spyware Program


SmitFraud (also known as W32/SmitFraud.A) is a malicious spyware application that may install itself secretly via adware. SmitFraud may also be brought into your computer bundled with a fake codec (that may include the following: BrainCodec, VideoKeyCodec or PCodec). SmitFraud is designed to inject a corrupt code in Windows DLL that usually results in Blue Screen of Death (a nasty desktop modification). SmitFraud may also generate misleading warning messages, in order to scare gullible computer users into buying fraudulent anti-spyware applications. It is strongly recommended to dispose of SmitFraud as soon as possible.

Posted on April 28, 2005 in Trojans


Zlob is a kind of malicious software known as a Trojan horse. This is a kind of attacker that exploits vulnerabilities in a computer to wreak havoc. The first time the Zlob Trojan was identified was in the last months of 2005. Since the middle of 2006, this Trojan has gained considerable attention from computer security experts.   Who Created the Zlob Trojan? The Zlob Trojan is thought to have been created by hackers in the Russian Federation. It is still not known exactly who created the Zlob Trojan, but it has been used in many of the criminal activities of the Russian Business Network. This is a shadowy criminal organization dedicated to providing hosting for criminal activities, child pornography, and distributing harmful malware.   How Does the Zlob Trojan Get into a Computer? Like many Trojans, the Zlob Trojan is often disguised...

Posted on April 25, 2005 in Trojans


RelevantKnowledge screenshot

RelevantKnowledge is software that exists in a moral grey area. RelevantKnowledge is widely considered spyware, because RelevantKnowledge will collect huge amounts of information about your Internet usage, and then use that information to put together even more information about you. That information is then sold, anonymously, either individually or as part of aggregate data. Given the way that RelevantKnowledge is installed on most computers, it is unlikely that most of those users are fully aware of the facts about RelevantKnowledge. What RelevantKnowledge is, and Where it Comes From RelevantKnowledge is a product of the company MarketScore, formerly called Netsetter. MarketScore...

Posted on April 8, 2005 in Adware


Hack99 is a Trojan keylogger that monitors and records every keystroke the user makes in order to capture usernames and passwords for online accounts. Once this information is acquired, it is sent to a remote unauthorized user. Hack99 is typically disguised as a computer game and downloaded manually this way.

Posted on April 5, 2005 in Keyloggers


FamilyKeyLogger screenshot

Keylooger.FamilyKeyLogger is a program that is able to record keystrokes and computer activity. Internet activity can be recorded and used to access a computer user’s online banking accounts or gain entry to steal other personal information. Ultimately, Keylooger.FamilyKeyLogger can lead to identity theft.

Posted on March 29, 2005 in Keyloggers


DoubleClick is an online business that is affiliated with Google. However, many PC security researchers and organizations consider their HTTP cookies as spyware since they can track a computer user's online activity and record any advertisements that are viewed on that Internet browser. In fact, many anti-malware programs remove or block the DoubleClick tracking cookie. It does not help matters that the DoubleClick opt-out option is not a solution. Security analysts have found that opting out of the DoubleClick tracking cookie does not eliminate tracking based on the computer users' IP address. There was also a period when criminals took advantage of DoubleClick and MSN in order to deliver malware through a security exploit. An Overview of the DoubleClick Tracking Cookie While DoubleClick has the capacity to monitor your online...

Posted on March 26, 2005 in Cookies