Gifables

The Gifables browser extension by Mindspark Interactive Network, Inc. may be offered for installation to users via free software bundles and platforms like crossbrowser.com. The Gifables extension is promoted to help users explore and create content associated with giphy.com. PC users that like to make and view animated images might be interested in installing the Gifables Toolbar from free.gifables.com/index.jhtml. The Gifables app can be found on the Chrome Web store, but it does not have a page on the Mozilla Add-ons platform. However, the Gifables software is an ad-supported product that may be used by advertisers to collect information about your online routine. The data may be analyzed by marketing algorithms and used to provide you with targeted commercials on connected sites. The Gifables browser widget requires the following...

Posted on May 16, 2017 in Possibly Unwanted Program

OnyonLock Ransomware

The OnyonLock Ransomware is a ransomware Trojan that was first observed by PC security researchers on May 2017. The OnyonLock Ransomware, like most ransomware Trojans, is designed to take the victims' data hostage in exchange for a ransom payment. To do this, the OnyonLock Ransomware will use a strong encryption algorithm to encrypt the victim's files, making them inaccessible. The OnyonLock Ransomware will display a ransom note demanding that the victim pays a large amount of money in exchange for the decryption software, which will allow the victim to recover the affected files. The OnyonLock Ransomware and similar Trojans are not designed to collect data but, rather, to extort computer users. The most common way in which the OnyonLock Ransomware is delivered is through the use of spam email attachments. These email attachments may...

Posted on May 16, 2017 in Ransomware

BlockFile12 Ransomware

The BlockFile12 Ransomware is a ransomware Trojan that was first observed in May 2017. The most common way that the BlockFile12 Ransomware is being distributed is through the use of corrupted text files that use macro scripts to download and install the BlockFile12 Ransomware on the victim's computer. These files are being delivered to the victims through the use of spam email messages. The BlockFile12 Ransomware carries out a typical encryption ransomware attack, encrypting the victim's files to make them inaccessible and then demanding the payment of a ransom from the victim. The BlockFile12 Ransomware takes the victim's files hostage in exchange for ransom. How the BlockFile12 Ransomware Infection Works When the BlockFile12 Ransomware is installed on the victim's computer, it will first scan all local drives (including network...

Posted on May 16, 2017 in Ransomware

TubeTime

The TubeTime software may be offered to PC users as an alternative entertainment platform to Netflix and Hulu. The TubeTime software is said to provide video content from YouTube in a program window that does not require integration with your browser. Apparently, the TubeTime desktop app can stream videos from YouTube and offer a search service but nothing more. There are no fancy themes for the app, there is no catalog, and you can't use your account at Google to customize your experience in TubeTime. Additionally, users who installed TubeTime reported that their browser might be redirected to commercials and promotional images via vendturead[.]com quite often. An investigation into the activities of TubeTime revealed that the TubeTime app is an ad-supported product that might reroute users to marketing content using the...

Posted on May 16, 2017 in Possibly Unwanted Program

CryptoViki Ransomware

The CryptoViki Ransomware is part of a large family of ransomware that is growing rapidly. Like many other ransomware Trojans, the CryptoViki Ransomware may be delivered to its victims through the use of spam email attachments. Once the CryptoViki Ransomware enters a computer, it will encrypt the victim's data systematically. The CryptoViki Ransomware does this to demand a ransom payment from the victim in exchange for the decryption key that is needed to recover the affected files. Effectively, ransomware Trojans like the CryptoViki Ransomware take the victims' files hostage and then extort the victims, demanding a large ransom. Although it is still not clear who is responsible for the CryptoViki Ransomware attack, there are clear relationships between the CryptoViki Ransomware and other recently released ransomware Trojans. How the...

Posted on May 16, 2017 in Ransomware

WanaCrypt Ransomware Soars to Almost 30% of Ransomware Threats Worldwide

WanaCrypt Ransomware, or what some have recently called WannaCryptor, WanaCrypt0r, WannaCryptor, WannaCry, WCry, or WNCry, infiltrated tens of thousands of computers around the world within the first few hours of its existence. About 100 countries have been the brunt of a ransomware attack that is leaving Windows-based computers locked due to file encryption. The proliferation of WanaCrypt ransomware is swift and continues to be a major nuisance for many hospitals, government entities, large corporations, and personal computers. While computer users around the globe are in a haste to either remedy the WanaCrypt ransomware issue or prevent it from overtaking their own system, the outlook remains bleak as there are no signs of the threat slowing down. ESG reports that WanaCrypt infections are slowing but believes that the effect is only...

Posted on May 15, 2017 in Computer Security

Boravid Ads

Web surfers who are urged into installing the Boravid browser extension might be bombarded with advertisements afterward. The Boravid browser extension is classified as an unreliable program that behaves like adware. The Boravid extension is pushed to users via untrusted advertisers and 'Add Extension' pop-up windows on recently registered pages. We have seen the Boravid extension being promoted the same way as the extensions associated with the Chrome-38.site domain. Web users that click on an interesting ad will be redirected to a recently registered domain where they will be urged to install the Boravid extension as an update to their browser to continue loading video and images correctly. Canceling the installation and choosing to leave the page, they get redirected to another site that is presented in full-screen mode...

Posted on May 15, 2017 in Adware

Election.interferencer.ru

The Election.interferencer.ru site is offered to Internet users as a customizable search service with a non-conventional layout. The search bar at Election.interferencer.ru is tilted to the left, there is no option to customize the page background, and you need to check the search engines that you want to access before you click the 'Find' button. However, after you set the search parameters you will not be presented to a tabbed interface on Election.interferencer.ru but there, will be several new tabs opened next to your current one. You might notice that the site owners did not provide contact information and your connection to Election.interferencer.ru is not encrypted. Also, there is a notification in the top right corner, which says: 'Anyway you haven't enough money to buy election interference, so relax and buy the most...

Posted on May 15, 2017 in Browser Hijackers

HTRS Ransomware

The HTRS Ransomware is a ransomware Trojan that is used to force computer users to pay large amounts of money. To do this, ransomware Trojans like the HTRS Ransomware take the victim's files hostage, encrypting them with a powerful encryption algorithm and then demanding the payment of a ransom in exchange for the means needed to recover the affected files. The HTRS Ransomware was first observed in May of 2017. The HTRS Ransomware may be delivered to victims through the use of corrupted spam email attachments and embedded links. The HTRS Ransomware is a variant of HiddenTear, an open source ransomware Trojan first released in 2015. This open source ransomware engine, released for 'educational purposes' initially, has been responsible for spawning countless variants. PC security analysts advise PC users to take preventive measures to...

Posted on May 15, 2017 in Ransomware

Zelta Free Ransomware

The Zelta Free Ransomware is an encryption ransomware Trojan first observed in May 2017. The Zelta Free Ransomware is being offered on the Dark Web. The Zelta Free Ransomware is being distributed through the use of corrupted spam email attachments currently. These email messages will include file attachments that will have macros that enable them to download and install the Zelta Free Ransomware on the victim's computer. How the Zelta Free Ransomware Attack is Carried Out Macro scripts are known vulnerabilities in the Windows operating system that have been exploited by con artists numerous times before. Victims may be greeted by a UAC (User Account Control) alert before the Zelta Free Ransomware is installed. When the victim allows the Zelta Free Ransomware to run, it will be installed on the infected computer's Temp directory and...

Posted on May 15, 2017 in Ransomware

Massive Worldwide ‘WannaCryptor or WanaCrypt0r’ Ransomware Attack Hitting Tens of Thousands at Record Pace

Computer hackers have gone into overdrive today as tens of thousands ransomware attacks have been initiated mostly targeting institutions in several European countries. What has turned out to be a busy day for hackers, there have been countless ransomware attacks launched to targeting several companies, hospitals, governments, and other organizations across the globe today. The onslaught of ransomware attacks have reached over 70 countries thus far and is expected to spread. Computer security experts have attempted to get a grasp on the range of the recent attack today, and so far, they have not confirmed how widespread it is other than being a potential worldwide crisis. The ransomware used in the attacks has been identified as WannaCry, as in you will eventually want to cry after discovering that your attacked computer is locked down...

Posted on May 12, 2017 in Computer Security

Haters Ransomware

The Haters Ransomware is an encryption Trojan that looks and behaves like the Cerber 3 Ransomware, but it has nothing to do with that particular form of crypto-threat. The Haters Ransomware Trojan is a copycat that uses the ransom note of Cerber 3 and similar cryptographic algorithms with the aim to fool users into believing that they have been compromised by one of the most efficient Trojans of last year. The Trojan aims to create the premise that there is only one way to recover access to your data when Cerber 3 is on your PC. However, the Haters Ransomware is a standalone project and malware researchers may be able to break its code and develop a decryption software. At the time of writing, the first samples of Haters Ransomware have been collected and submitted for an in-depth analysis. Cyber security investigators were aware of...

Posted on May 12, 2017 in Ransomware

Jaff Ransomware

The Jaff Ransomware is a file encoder Trojan that was reported by infected users in the second week of May 2017. Cyber scrutiny researchers alert that the main distribution method employed by the Jaff Ransomware's authors is spam emails that carry a corrupted DOCX file. A Microsoft Word document is sent out to users, which include an invitation to the user that suggests enabling the editing and macro functionalities in the word processor to load the file properly. Needless to say, if you go after the instructions, the installation of the Jaff Ransomware will be completed in seconds. We have received reports that the corrupted document may feature the following names: Copy_[RANDOM NUMBERS] Document_[RANDOM NUMBERS] File_[RANDOM NUMBERS] PDF_[RANDOM NUMBERS] Scan_[RANDOM NUMBERS] The carrier email message may suggest that the attached...

Posted on May 12, 2017 in Ransomware

‘.loptr File Extension’ Ransomware

The '.loptr File Extension' Ransomware is an encryption Trojan which is based on the Locky Ransomware. This iteration of the Locky Trojan is named after the '.loptr' string attached to the original file extension of encrypted data. For example, 'Rasberry crazy ant.pptx' is renamed to 'Rasberry crazy ant.pptx.loptr.' The '.loptr File Extension' Ransomware is classified as an adapted version of the top-tier Locky Ransomware. The Trojan features slight modifications to the encryption routine enough to bypass most AV scanners. Additionally, the authors of the threat included a new server configuration that makes the Trojan transmit data to site compromised recently and hidden pages. The '.loptr File Extension' Ransomware appears to be adapted for attacks on regular PC users and the payload is delivered via spam emails and corrupted links...

Posted on May 12, 2017 in Ransomware

Freshdesk Ransomware

The Freshdesk Ransomware is a file encoder Trojan that is not connected to the legitimate Freshdesk help desk ticketing system maintained by Freshdesk Inc. Malware authors used the name 'Freshdesk' in a ransom note delivered to users infected with their Trojan. The Freshdesk Ransomware is programmed to encode data on the compromised system and display a message that includes the statement 'Help Desk software by Freshdesk.' The note is intended to look like a professional access panel to decryption services available to users infected with the Freshdesk Ransomware. Evidently, the authors of the Freshdesk Ransomware like the operation of the Spora Ransomware campaign, which gained popularity for their victim-friendly support staff that communicates in the same fashion as a legitimate computer support agent would. As you can imagine, the...

Posted on May 12, 2017 in Ransomware
1 2 3 4 5 6 7 8 9 10 11 12 13 1,152