Package Tracker Guru

The Package Tracker Guru is a Potentially Unwanted Program (PUP) that hides behind the promise of a profusion of useful features such as a convenient way to access package tracking and carrier services, local weather forecasts, among others, right from the new page tab of your browser. Exactly as the rest of these applications, all of these features are barely functionals. However, there is a simple explanation, as this is not the real purpose of the application. No, the Package Tracker Guru entire goal is to promote a fake search engine and generate revenues by displaying sponsored advertisements. To do so, it takes over the Web browser of the user and modifies its default settings. All of the most popular browsers can become victims, but the main target is Google Chrome. Once the user's browser is under its control, the Package...

Posted on August 18, 2020 in Potentially Unwanted Programs

Track Your Package Now

The Track Your Package Now boasts having quite a few useful features. It offers users the ability to access package tracking and carrier services right from the new page tab of their browser. In addition, this application also will help you reach local news and weather, as well as popular email services. Unfortunately, there is a huge caveat when dealing with the Track Your Package Now - it is little more than a browser hijacker designed to take over the most popular Web browsers for the promotion of a fake search engine and the generation of money through sponsored ads. Applications such as the Track Your Package Now are be considered as Potentially Unwanted Programs (PUPs). The effects of the Track Your Package Now can be seen almost immediately after its installation. The default homepage and new page tab of the browser will be set...

Posted on August 18, 2020 in Potentially Unwanted Programs

AllConvertersSearch

AllConvertersSearch is a Possibly Unwanted Program (PUP) dedicated to promoting a fake search engine and the generation of money through sponsored links. The application may try to hide behind claims of useful features, but its real purpose becomes evident almost immediately after it has been installed on the computer. It targets all the mainstream Web browsers - Google Chrome, Microsoft Edge, Mozilla Firefox, Safari, etc., and modifies their default settings. AllConvertersSearc changes the homepage and new page tab to open either portal.allconverterssearch.com or feed.allconverterssearch.com. The default search engine will be set to feed.allconverterssearch.com, and all search queries carried out by the user will be redirected through it. On its own, though, the promoted search engine doesn't have the ability to generate a list of...

Posted on August 18, 2020 in Potentially Unwanted Programs

ConvertrzSearch

ConvertrzSearch can be classified as Possibly Unwanted Program (PUP) dedicated to the promotion of a fake search engine. ConvertrzSearch also can be regarded as a browser hijacker due to its dubious distribution methods. Like so many other similar applications, ConvertrzSearch claims to offer quite a few features that sound appealing enough but in practice are barely functional. While performing its main design goal, however, it performs admirably. Once the user has agreed to install ConvertrzSearch or the application has managed to install itself without the user realizing it thanks to marketing methods such as bundling, it changes the default settings of the browsers present on the computer immediately. The default search engine will be set to feed.convertrz-search.com, and all searches conducted on the browser will be redirected...

Posted on August 18, 2020 in Potentially Unwanted Programs

Kutaki Keylogger

The Kutaki Keylogger is a piece of malware that is classified as a keylogger or keystroke logger. Its only purpose is to run unnoticed in the background of the infected machine and monitor, log, and collect information. The goal of the cybercriminals behind the Kutaki Keylogger is to obtain confidential information that they can then use for monetary gains. As a result, having the Kutaki Keylogger, or any other keylogger threat on your computer could have devastating consequences. The Kutaki Keylogger was caught by cybersecurity researchers to be distributed by a small-scale phishing campaign. The malware threat was hidden inside a legitimate Visual Basic application. The Kutaki Keylogger is equipped with techniques against analysis, running in a virtual machine, and debugging tools. Although the specific techniques appear to be...

Posted on August 18, 2020 in Keyloggers

Aim Ransomware

The goal of the Aim Ransomware is to infiltrate the victim's computer and lock the files stored on it, rendering them unusable. The Aim Ransomware is yet another addition to the ever-growing malware family of the Dharma Ransomware variants. This malware threat follows a complex pattern for the name of every successfully encrypted file; a unique ID, the criminals' email address, and a '.Aim' will be appended to the end of the original filename. For example, 'Picture1.png' will be renamed to 'Picture1.png.[ID-string].[Smith1@mailfence.com].Aim'. A very short message will be dropped in a text file named 'FILES ENCRYPTED.txt' while the main ransom note left by the hackers will be displayed in a pop-up message generated after the encryption process has completed. In the note, the cybercriminals do not specify a specific sum for the...

Posted on August 18, 2020 in Ransomware

Bundlore

Bundlore, also known as Adware.MacOS.Bundlore, MacOS Bundlore, and Crossrider, is a Potentially Unwanted Application (PUA) designed to bundle third-party adware-like tools in a single installer and spread them over the Web. Originally targeting Windows-based systems, Bundlore now lands uninvited on Macs, as well. Covering Tracks MacOS Bundlore reportedly arrives as part of other software bundles, or through bogus software updates. In some occurrences, Bundlore may infect your system following a click on a web pop-up. Regardless of its distribution method, Bundlore is known to be quite covert in nature and Mac users rarely find out about it until the app has already got installed. What to Expect? You will know you’ve had a Bundlore infection when you see your default search engine has been changed to searchmine(dot)net for no apparent...

Posted on August 18, 2020 in Adware, Mac Malware

Backtonews.biz

Backtonews.biz is a browser-based tactic that has been created to deliver pop-up messages with commercial content to users' mobile devices or PCs directly. Backtonews.biz uses a corrupted website to fulfill its goal. When the users open the fraudulent page, they see a fake error message saying: "Backtonews.biz wants to Show notifications  Click Allow to watch the video!" You should not trust this website. Never hit the "Allow" button, because by doing so, you will give Backtonews.biz permission to deliver suspicious advertisements straight to your computer or mobile phone unwillingly. These advertisements will contain annoying gaming content, adult websites, or links to potentially unsafe resources on the Internet. Therefore, you should delete Backtonews.biz from your device immediately, as it may lead to the download and installation...

Posted on August 18, 2020 in Browser Hijackers

Hopsigna.com

Hopsigna.com is a useless website that displays a fake error message to trick users into subscribing to its browser notifications. The misleading pop-up window contains the following text: "Hopsigna.com wants to Show notifications  Press 'Allow' to confirm push-notifications!" Never click on the "Allow" button, because, doing it, this unsafe tool will start flooding you with unwanted advertisements for adult content, gaming websites or fake software updates. These advertisements will appear on your screen even if you have not launched an Internet browser, and they could contain threatening links infected with malware. Seeing Hopsigna.com pop-ups on your device also could be a symptom of an adware infection. In that case, you also may notice that your browser has been hijacked, and its homepage, new tab settings, and default search...

Posted on August 18, 2020 in Browser Hijackers

Ussiarusse.club

Ussiarusse.club pop-ups is an online tactic that utilizes social engineering techniques to persuade users to subscribe to its browser notifications. This scheme's final goal is to send pop-up messages with commercial third-party content straight to the users' computers or mobile phones. The website through which Ussiarusse.club operates displays an alert with the following text: 'Ussiarusse.club wants to Show notifications Please Press Allow to Continue Watch!' The real goal is to make the user click on the "Allow" button, giving thus permission to Ussiarusse.club to deliver push notifications. You should never click on that button because if you do, annoying advertisements from this unsafe website will start showing up on your screen uninterruptedly. This will happen even if you are not using an Internet browser currently. To remove...

Posted on August 18, 2020 in Browser Hijackers

MyCouponsmart

MyCouponsmart (Adware.MacOS.CouponSmart) is classified as a potentially unwanted program by most security solutions. More specifically, it's designated adware. However, it does have some features which are more common for browser hijackers. It has an official website where MyCouponsmart is presented as an application that aims to save the user time and money by offering coupons and notifications for promotions and discounts collected from various websites. MyCouponsmart is hardly unique as there are numerous similar applications and there are reasons why most of them are categorized as potentially unwanted applications. For MyCouponsmart the main reasons are: It is often installed without the user's expressed knowledge and consent MyCouponsmart tracks browsing activity and collects private information Intrusive advertisements typical...

Posted on August 18, 2020 in Adware, Mac Malware

Vigram

Vigram is a highly dangerous Trojan that sneakers unnoticed into target computers and performs a number of malicious activities in the background. As soon as it is loaded and run, Vigram starts to modify the infected system's entire internal configuration and corrupt the system files and registries. Then, it disables any active firewalls and anti-virus software installed on the machine. This last feature creates a backdoor for other harmful malware threats to enter the system undisturbed. Vigram also acts as a rogue anti-malware application. It displays bogus security scans and warning messages to prompt the user to pay for the full version of some fake anti-virus program. Furthermore, this Trojan has spyware and adware features - it can record the user’s browsing activities, like pages visited, performed search queries, cookies, etc....

Posted on August 18, 2020 in Mac Malware, Trojans

Lador

Lador (Trojan.MacOS.Lador) is a dangerous malware threat that provides cybercriminals with remote access to Mac devices without the knowledge or consent of the device’s user. These cyber-attacks' main goals are to steal personal information that can be valuable to the attackers (like banking details and credit card numbers) and to install other malware to allow for expanded functionalities. Additionally, Lador Trojan may cause redirects to dubious pages on the Internet, launch other tools, or show pop-up messages. For an initial period of time, the Trojan could remain unnoticed, however, at some point users will start to experience some symptoms, like the presence of bogus processes running in the Task Manager, crashing of software, services, or webpages, a sudden increase in the CPU usage, and overall sluggish performance of the...

Posted on August 18, 2020 in Mac Malware, Trojans

Jailbreak

Jailbreak (Trojan.MacOS.Jailbreak) pretends to be a normal jailbreaking software for Mac that would allow users to remove restrictions imposed by Apple and install on their devices software that is not available through the official Apple Store. In fact, Jailbreak Trojan is a very harmful tool whose main objective is to capture keystrokes on Mac systems and steal banking information; therefore, it should be removed immediately after being detected. There are two ways that cybercriminals can use to infect devices with Jailbreak Trojan. One possibility is to exploit zero-day vulnerabilities and install exploit kits into running web services and sites. That would subsequently allow them to load the Trojan on the target machine. The second method involves social engineering techniques through which users are tricked into downloading files...

Posted on August 18, 2020 in Mac Malware, Trojans

ShopSmart

The developers of Adware.MacOS.ShopSmart advertise it as a useful program that displays discount coupons, deals, and competitive offers for products that users search in online shops. Yet, cybersecurity experts classify it as a Potentially Unwanted Program (PUP) due to its deceptive means of distribution. Technically, ShopSmart is an adware-type of a threat. It installs as a browser extension, and its primary goal is to generate intrusive and misleading pop-ups containing texts like "Brought to you by Shop Smart," "Powered by Shop Smart," "Ads by Shop Smart," or "You’ve received a premium offer from Shop Smart." Clicking on any of these pop-ups leads to the installation of other questionable third-party tools, generating pay-per-click revenues for Shop Smart owners. This adware also changes random web page texts into hyperlinks and...

Posted on August 18, 2020 in Adware, Mac Malware