Search Baron

Search Baron is an application tailored for Apple's OSX specifically. While the Search Baron application does not fall under the category of malware, rest assured that it would in no way improve your browsing experience. The Search Baron application's only goal is to promote its own search services aggressively. The Search Baron page uses the Bing search engine to deliver results to the user. However, the search results may be of poor quality, and this application may even redirect users to third-party websites with dubious content. It appears that the Search Baron software also spams the user with unwanted advertisements. Can Sneak into Your System Silently If you install the Search Baron application, it will make changes to your default homepage, as well as your new tab page, changing it to its own website that contains the search...

Posted on August 23, 2019 in Browser Hijackers

'Drive-by Exploit' Email Scam

Not all cyber crooks are armed to the teeth with all sorts of complex hacking tools, as the average user tends to imagine. Often, such elaborate threats are not needed as the attackers can use human psychology to manipulate the users into performing actions they normally would not. This is the art of social engineering, and it is very widely exploited for unsafe purposes by cybercriminals. The authors of the 'Drive-by Exploit' Email Scan have employed this method in the spreading of their creation. Social Engineering Tricks The 'Drive-by Exploit' scam relies on spam email campaigns and no users are safe, if their emails are known publicly. The email distributed is rather lengthy. In it, the attackers go on to explain to the users how their system had been compromised by a threat named 'private malware' because they have visited a...

Posted on August 22, 2019 in Annoyance

Ecleneue.com

The Eclenue.com web page appears to be built with rather shady intentions in mind. It will in no way infect your system with any malware, but its creators are employing social engineering techniques to manipulate their users clearly. Once the users visit the Eclenue.com website, they are likely to get spammed with what appear to be legitimate Google Chrome notifications. These notifications were tailored to resemble a 'SYSTEM ERROR' message and urge the user to click on the 'Click to fix' button. If the users fall for this and click on the button, they will be redirected to a website that is affiliated with the individuals running the Eclenue.com web page. Promotes Shady Websites This can become very irritating quickly because the Eclenue.com website appears to send out these notifications very regularly. Since this is a shady service,...

Posted on August 22, 2019 in Browser Hijackers

InformationVine.com

There are numerous browser extensions, which serve shady purposes and mislead users into thinking they are installing a high-quality extension tool. One of them is the InformationVine browser extension. The goal of the InformationVine extension is to generate traffic for their own website – informationvine.com. The InformationVine add-on does this by setting up the informationvine.com Web page as the default homepage of the user, as well as the new tab. Low-Quality Search Results The installation of the InformationVine extension also may mess with the browser's search engine settings - it is possible that any searches initiated through the address bar may end up on the results page of informationvine.com. The search engine promoted by the InformationVine add-on is functioning, but it appears that the top results are sponsored and thus...

Posted on August 22, 2019 in Browser Hijackers

Google Voice Code Verification Scam

There are numerous tactics and tricksters creeping all around the Internet. Some are rather harmless, while others have the potential to cause great damage. The 'Google Voice Verification Code' scam is one of the more harmful misleading tactics. Generates Substantial Phone Bill The shady individuals responsible for the 'Google Voice Verification Code' scam operate in a rather interesting manner. They would go through Craigslist (and similar platforms) and pick victims. The user will then be contacted via phone by the con artists whowill state that they have a verification system in place, and the user will be sent a code shortly. Then, they will require the victim to forward them the verification code so that they would confirm that the advertisement was not bogus. None of their claims are true, of course. If the user falls for their...

Posted on August 22, 2019 in Uncategorized

Ads by Adrail

There are many applications on the Web whose sole purpose is to spam users with unwanted advertisements. The Ads by Adrail or Adrail Ads is one of them. This shady application will sneak into your system, remain on the down-low, and you may never even realize it is operating in the background. Labels Its Advertisements This shady piece of software also will make sure to alter the settings of the user's browser and grant itself permission to spam the person with advertisements planted on the websites they visit. The Adrail application also will make sure it has permission to show notifications. It is very likely that the notifications will be another tool for the Adrail software to promote various products and services. The advertisements that the Adrail applications spams the user with will be labeled 'Adrail Ads' or 'Ads by Adrail.'...

Posted on August 22, 2019 in Adware

Cetori Ransomware

Ransomware threats are a very popular type of malware. Such data-locking Trojans would infiltrate your system, lock your data using an encryption algorithm, and then demand a sometimes staggering fee in return for a decryption key, which is supposed to unlock all the affected files. Propagation and Encryption One of the newest threats in the world of ransomware is the Cetori Ransomware. When researchers studied the Cetori Ransomware, they found out it belongs to the STOP Ransomware family. However, experts have not been able to reach a consensus regarding the propagation methods employed in the spreading of the Cetori Ransomware. Some state that it is highly like that mass spam email campaigns, alongside fake software updates and pirated copies of legitimate software may be among the infection vectors utilized by the authors of the...

Posted on August 22, 2019 in Ransomware

Masodas Ransomware

The Masodas Ransomware is among the newest ransomware threats uncovered. Malware researchers spot new data-locking Trojans daily as cybercriminals' interest in this malware type grows by the day. Some choose to build their own file-encrypting Trojans, while others, who are often less capable, borrow the code of already established ransomware threats. Propagation and Encryption Once the cybersecurity experts dissected the Masodas Ransomware, they found out that it is a variant of the notorious STOP Ransomware. It is not clear what infection vectors are employed in the spreading of this nasty Trojan. Some researchers speculate that the authors of the Masodas Ransomware may have taken the usual path and used the most common methods of spreading this malware, namely bogus software updates, mass spam email campaigns, and pirated fake...

Posted on August 21, 2019 in Ransomware

Krusop Ransomware

There is a growing interest in the 'business' of ransomware. More and more shady individuals decide to partake in this criminal activity as ransomware threats are perceived as a way to make a quick buck with almost no fear of consequences widely. One of the most recently spotted data-locking Trojans is the Krusop Ransomware. Propagation and Encryption When the cybersecurity experts that uncovered the Krusop Ransomware studied this threat closer, it became clear that it belongs to the STOP Ransomware family. However, they have not been able to determine with any certainty what are the propagation methods that the creators of the Krusop Ransomware have used. Some believe that fake application updates, bogus copies of popular software tools, and spam emails containing infected attachments may be among the infection vectors employed by the...

Posted on August 21, 2019 in Ransomware

VIAGRA Ransomware

Ransomware attacks are on the rise and malware researchers detect more and more data-locking Trojans being pumped out every day. It would seem that everyone in the world of the cybercrime wants a piece of the pie – the more tech-savvy individuals build their own file-encrypting Trojans, while the less-able ones simply borrow the code of already existing ransomware threats. One of the latest additions is the VIAGRA Ransomware. Propagation and Encryption It is yet to be determined what the infection vectors are involved in the spreading of this vicious Trojan are. Some cybersecurity experts state that emails containing macro-laced attachments, pirated fake copies of legitimate applications, and fraudulent software updates are likely to be among the propagation methods utilized by the authors of the VIAGRA Ransomware. When this...

Posted on August 21, 2019 in Ransomware

STAFS Ransomware

Recently, malware experts have spotted a brand-new file-encrypting Trojan rearing its ugly head. This new threat is called the STAFS Ransomware. An increasing number of cyber crooks are giving building ransomware a try as spreading data-locking Trojans can prove to be a very profitable pursuit. Propagation and Encryption Upon uncovering the STAFS Ransomware, the cybersecurity researchers decided to dissect it. Once they did that, they quickly realized that the STAFS Ransomware is a variant of the wildly popular Dharma Ransomware. We are not aware of the exact propagation method the authors of the STAFS Ransomware have employed. Some experts speculate that the most common propagation techniques may be at play here. That means that it is likely that the attackers have used mass spam email campaigns, alongside fake application updates,...

Posted on August 21, 2019 in Ransomware

Nuksus Ransomware

Malware researchers discover new data-locking Trojans daily. It would appear that cyber crooks see ransomware threats as a quick way to make some cash. Some of them are very tech-savvy and are capable of building a file-encrypting Trojan from scratch. However, others who are not as skilled often opt to create ransomware threats based on the code of already existing threats. This is the case with the Nuksus Ransomware. This is brand-new data-locking Trojan, which belongs to the STOP Ransomware family. It is not clear what are the propagation methods employed by the creators of the Nuksus Ransomware. Some believe that the authors of this ransomware threat may have used the most common methods to spread their creation – fake application updates, bogus pirated versions of legitimate software, and mass spam email campaigns. When the Nuksus...

Posted on August 20, 2019 in Ransomware

Plague17 Ransomware

Recently, malware researchers have uncovered a brand-new ransomware threat called the Plague17 Ransomware. Upon further inspection, it would appear that this data-locking Trojan does not belong to any of the popular ransomware families. Cybersecurity experts are not yet able to determine with any certainty what are the infection vectors used in the propagation of this file-encrypting Trojan. It is speculated widely that the creators of the Plague17 Ransomware may have used some of the most favored methods of propagating ransomware threats such as mass spam email campaigns that carry infected attachments, fraudulent software updates, and fake pirated copies of popular applications. If the Plague17 Ransomware manages to compromise your system, it will begin the attack by performing a swift scan, which is meant to locate all the files...

Posted on August 20, 2019 in Ransomware

Banta Ransomware

It appears that an increasing number of cybercriminals are trying their luck in creating various ransomware threats. This is likely because spreading data-locking Trojans is perceived as a quick way to make a buck on the backs of innocent users. One of the newest file-encrypting Trojans that has been plaguing the Web recently is the Banta Ransomware. Once researchers discovered this ransomware threat, they dissected it and found out that it is a variant of the notorious Phobos Ransomware. However, they have not been capable of determining the propagation methods employed in the spreading of this nasty Trojan. It is likely that the most common techniques may be at play in this case too, namely spam emails containing macro-laced attachments, bogus copies of popular software tools and fraudulent application updates. When the Banta...

Posted on August 20, 2019 in Ransomware

Vesrato Ransomware

An increasing number of shady individuals worldwide have taken up creating data-locking Trojans. This is a very lucrative market as cyber crooks spreading ransomware threats are likely to generate a good amount of cash and avoid any negative consequences for their criminal activity. The Vesrato Ransomware is among the newest detected data-locking Trojans. Once malware experts uncovered this threat, they studied it and determined that this file-encrypting Trojan is a variant of the infamous STOP Ransomware. However, researchers have failed to determine the infections vectors that the Vesrato Ransomware's creators have used to spread this ransomware threat. It is widely believed that the most common propagation methods may be at play in the case of the Vesrato Ransomware – mass spam email campaigns, bogus software updates, and fake...

Posted on August 20, 2019 in Ransomware
1 2 3 4 5 6 7 8 9 10 11 12 13 1,356