Monument Ransomware

The Monument Ransomware is a ransomware Trojan that is also known as DarkLocker. There are two versions of the Monument Ransomware; one that locks the victim's screen and the other that encrypts the victim's files to demand the payment of a ransom. While one is more difficult than the other to deal with significantly, both versions of the Monument Ransomware pose a significant threat to computer users. The Monument Ransomware is delivered to the victims' computers through the use of corrupted spam email attachments and by installing the threat on the victim's computer directly through the use of a RAT (Remote Access Trojan) or by taking advantage of poor security measures. How the Monument Ransomware Encrypts the Victims' Computers The Monument Ransomware uses a combination of the RSA-2048 and AES-256 encryptions to make the victim's...

Posted on March 28, 2017 in Ransomware

SADStory Ransomware

Malware analysts have observed threat attacks linked to a group producing low-quality threats that are calling themselves 'Mafia Malware Indonesia.' This group has claimed responsibility for various threat attacks, including the SADStory Ransomware. The SADStory Ransomware is a ransomware Trojan that is designed to infect computers, encrypt files, and ask for the payment of a ransom from the victim. The SADStory Ransomware and Other Mafia Malware Indonesia Creations The group responsible for the SADStory Ransomware was first observed in March 2016 after various attacks targeting online retailers using Magento to came to light. These attacks had been associated with the email address 'tuyuljahat@hotmail.com.' Tracking this email address has been a way for PC security researchers to follow the activities of the group responsible for the...

Posted on March 28, 2017 in Ransomware

Yelloader

The Yelloader program is classified as an adware that belongs to the Adware Helpers family of programs. The Yelloader adware may be promoted as a video plug-in for your browser and a helpful search extension for Google Chrome, Internet Explorer, Mozilla Firefox, and Opera when you explore the 'Advanced' and 'Custom' option of a free software bundle. It may be hard for users to determine if they were infected with the Yelloader adware because it keeps a low profile and does not hijack system resources. The Yelloader adware may register a new background system service named 'windowsmanagementservice,' inject DLLs into the browser and make modifications to how Adobe Flash Player works. Computer security analysts report that the Yelloader adware is associated with the following folders and executable: C:\Program Files (x86)\cpx\cpx.exe...

Posted on March 27, 2017 in Adware

Pro Flip Ads

The Pro Flip browser extension is promoted at pro-flip.webstore-advisor.net/en/install as the best online shopping widget that helps you save money smarter and faster. PC users can install the Pro Flip extension to Google Chrome and benefit from suggestions by Pro Flip on the items they are interested in. The site pro-flip.webstore-advisor.net/en/install says that Pro Flip is designed to scan pages you visit on the Internet and provide the user with options on where to purchase a certain item cheaper. However, you may want to know that Pro Flip is adware, which is a re-branded version of Enhance Pro and Price Turtle. The Pro Flip adware pretends to be a legitimate extension but it does not offer information on its developer, company and there are no contact details listed on pro-flip.webstore-advisor.net/en/install. The Pro Flip adware...

Posted on March 27, 2017 in Adware

Super-search.org

The Super-search.org and Mysupersearch.net are associated with the Super Search browser add-on that may be distributed to users via freeware bundles. The Super Search browser add-on works with Super-search.org and Mysupersearch.net to deliver search results that are said to be spot on and rival services like Google and Yahoo. However, the Super Search browser add-on is classified as a browser hijacker since most installations of the software happen automatically. Additionally, Super-search.org and Mysupersearch.net do not offer information regarding their governing company and a feedback option. The Super Search browser hijacker may redirect users to Super-search.org and Mysupersearch.net when they begin an online session, open a new tab and input keywords on the Omnibox, URL bar and search bar. The aim of the Super Search browser...

Posted on March 27, 2017 in Browser Hijackers

Urgent-issue-no38817-system.info

The Urgent-issue-no38817-system.info site is used for technical support hoaxes, and you should not call the phone the lines listed at Urgent-issue-no38817-system.info. We have received reports from users infected with a browser hijacker saying that they are shown pop-ups by Urgent-issue-no38817-system.info and directed to call numbers like 38-566-6133. The browser hijacker associated with Urgent-issue-no38817-system.info may have entered the computer through free software bundles and changed the settings of browsers like Google Chrome, Opera, Internet Explorer and Mozilla Firefox. Affected users are redirected to Urgent-issue-no38817-system.info on random intervals, and their browser may become unresponsive. The problems with Urgent-issue-no38817-system.info are caused by bad JavaScript code uploaded to...

Posted on March 27, 2017 in Browser Hijackers

BetterAds

The BetterAds program that you may notice listed under the 'Advanced' and 'Custom' option of free software packages is categorized as adware. Computer security researchers alert that the BetterAds adware may be promoted to users as a shopping companion that can improve their access to discounts and coupons online. The BetterAds adware is a program that might flood your screen with floating ad boxes, pop-up windows, and banners, which offer marketing materials. The abundance of advertisements shown by BetterAds is intended to maximize the profit from pay-per-click revenue for its developers. The BetterAds adware is not a threat to your online banking account, but it may redirect users to phishing pages and misleading offers on untrusted online shops. The BetterAds adware works similarly to MediaAds and High Unite and may collect data...

Posted on March 27, 2017 in Adware

Zorro Ransomware

The Zorro Ransomware is a ransomware Trojan that is used to force computer users to pay ransoms after taking its victim's files hostage. The Zorro Ransomware was first observed on March 24, 2017, and is being distributed through spam email attachments probably. The Zorro Ransomware is designed to infect computers using the Windows operating system and may be installed through the use of corrupted macro scripts contained in corrupted Microsoft Word or PDF files. PC security researchers consider that the Zorro Ransomware represents a real threat to the computer users' data. Because of this, they should take precautions to limit the damage these threat infections can cause to their computers. How the Zorro Ransomware Carries out Its Attack The Zorro Ransomware infection follows a pattern similar to most encryption ransomware Trojans. The...

Posted on March 27, 2017 in Ransomware

Crptxxx Ransomware

The Crptxxx Ransomware was first observed in March 2017. The Crptxxx Ransomware is an encryption ransomware Trojan, which encrypts victims' data and then demands the payment of a fee in exchange for the decryption key. The Crptxxx Ransomware deploys a method that bypasses UAC (Microsoft User Account Control), allowing the Crptxxx Ransomware to infect the victim's files without triggering a UAC notification. After the victim's data has been encrypted using AES encryption, the Crptxxx Ransomware delivers a ransom note demanding the payment of a large amount of money in exchange for the means to recover the affected files. How Bad can be Getting Infected by the Crptxxx Ransomware The files encrypted in the Crptxxx Ransomware attack are recognizable easily because the extension '.crptxxx' will be included to the end of the file name. The...

Posted on March 27, 2017 in Ransomware

CyboScan PC Optimizer

The CyboScan PC Optimizer software is promoted as a useful program that can help boost your system's performance by cleaning unnecessary files and removing bad Registry entries on the Windows OS. The program sports a simple and clean interface that is centered around the file scanner and shredder, which are the primary functions of the program. The main window of the CyboScan PC Optimizer includes information about the computer such as CPU model and Windows version. Computer users can use the CyboScan PC Optimizer determine the state of their machine without paying a dime within the first seven days after CyboScan PC Optimizer was installed on their computers. The other functions of the CyboScan PC Optimizer, which include file shredder, speed test at speedtest.net by Ookla, and the duplicate files finder can be found in the upper...

Posted on March 27, 2017 in Possibly Unwanted Program

Enhance Pro Ads

The Enhance Pro browser extension by Enhance-pro.apps-repo.net is promoted as a widget for Google Chrome that can help you discover the best deals on online stores like Amazon, eBay, Alibaba and alternative platforms. The Enhance Pro program claims to help users save money by providing a panel in the top right corner of their browser, which includes offers from trusted ad networks and merchants. The panel by the Enhance Pro may pop up when you open pages on an online store and browse items you are interested in. The Enhance Pro extension is designed to read all pages you open and scan them for keywords that are associated with products from sponsors and partnering vendors. You should read the Terms of Service and Privacy Policy posted on enhance-pro.apps-repo.net/bg/privacy and enhance-pro.apps-repo.net/bg/terms that reveal disturbing...

Posted on March 24, 2017 in Adware

AngleWare Ransomware

The AngleWare Ransomware is an encryption ransomware Trojan based on HiddenTear, an encryption ransomware engine that was released in 2016 to the public for 'educational purposes.' Since its release, HiddenTear has been responsible for countless ransomware variants, including the AngleWare Ransomware. Computer users are advised to take precautions to limit the damage caused by ransomware Trojans like the AngleWare Ransomware, which are becoming very common. In most cases, having backup copies of all files is the best way to ensure that these threats do not cause lasting damage. The AngleWare Ransomware may be delivered through corrupted spam email messages, and malware analysts advise computer users to learn to handle email messages securely. How the AngleWare Ransomware may be Delivered A document containing corrupted macro scripts...

Posted on March 24, 2017 in Ransomware

Flotera Ransomware

The Flotera Ransomware is a ransomware Trojan that seems to be related to the Polski Ransomware. The Flotera Ransomware was developed using an open source file encryption resource named AESxWin. Once the Flotera Ransomware enters a computer, it encrypts the victim's files using the AES-256 encryption. Once the Flotera Ransomware has finish encrypting the files, they will have the file extension '.aes' added to the end of the files' names. The Flotera Ransomware creates a text file named '!!!-ODZYSKAJ-DANE-!!!.TXT,' which is dropped on the infected computer's Desktop. This file warns the victim to pay a ransom to recover the affected files. The Threat Used by the Flotera Ransomware to Force PC Users to Pay Its Ransom Quickly The Flotera Ransomware's ransom note is written in Polish, and will not be readable for computer users that are...

Posted on March 24, 2017 in Ransomware

Meteoritan Ransomware

The Meteoritan Ransomware is an encryption ransomware Trojan that is used by con artists to force computer users to pay large amounts of money. The Meteoritan Ransomware attacks were first reported on March 22, 2017. PC security researchers suspect that the Meteoritan Ransomware is being distributed using corrupted documents attached to spam email messages. These documents contain corrupted scripts that download and install the Meteoritan Ransomware on the victim's computer. Once the Meteoritan Ransomware enters a computer, it encrypts the victim's files with a strong encryption algorithm to demand the payment of a ransom through BitCoins. Threats like the Meteoritan Ransomware pose a serious threat to the computer users' data. Once the Meteoritan Ransomware encrypts the files, they become unrecoverable, and it will be necessary to...

Posted on March 24, 2017 in Ransomware

Test My Speeds

The Test My Speeds browser extension for Google Chrome is marketed as a tool that can help users keep track of parameters related to their Internet connection, which includes ping, speed, rate and stability. The Test My Speeds extension is a free-to-use product by Polarity Technologies Ltd., which offers services from Eightpoint Technologies Ltd. When you begin the installation of Test My Speeds it will require access to all your data on the websites you visit, bookmarks collection, Internet history and may change your new tab page to search.testmyspeeds.co. All services of Test My Speeds are offered via search.testmyspeeds.co but you don't need to install the extension to load the site correctly. Search.testmyspeeds.co is presented as a useful new tab replacement, which includes links to articles on broadbandchoices.co.uk and guides...

Posted on March 24, 2017 in Possibly Unwanted Program