Threat Database
Every day new computer threats threaten and harm computers around the world. Many computer threats including viruses, adware, trojans, rogue anti-spyware programs and other malware can be installed onto your computer without your knowledge, potentially damaging files on your hard drive. Our threat database provides you with detailed threat analysis on different types of computer threats to help you understand how to remove and avoid them.
Our threat database is updated on a continual basis to provide our users with information specific to threats affecting their computer. Each day our threat research team analyzes data from a wide array of threat types. Here computer users are able to decipher types of well-known threats as well as new and emerging harmful software. The information on the threat database provides data to detect and remove all known types of malware threats.
Most Trending Malware in the Last 2 Weeks
Threat Name | Threat Level | Alias | Detection Count | Date |
---|---|---|---|---|
Silver Sparrow Malware | N/A | N/A | February 19, 2021 | |
Search Marquis | N/A | N/A | June 9, 2020 | |
Random Music Playing Virus |
![]() |
N/A | N/A | October 8, 2013 |
Segurazo |
![]() |
N/A | 419,847 | March 6, 2020 |
Search Baron | N/A | N/A | August 23, 2019 | |
Jokerlivestream.com | N/A | N/A | March 6, 2020 | |
KMSpico | N/A | N/A | February 7, 2019 | |
PC Accelerate Pro |
![]() |
N/A | 110,412 | March 24, 2016 |
PC Repair |
![]() |
N/A | 88 | August 27, 2011 |
'National Consumer Center' Pop-Ups | N/A | N/A | April 28, 2016 | |
Porn Virus | N/A | N/A | September 13, 2010 | |
Avg-Online-Scanner.com | N/A | N/A | November 4, 2008 | |
'Complete an offer to continue' Virus |
![]() |
N/A | N/A | April 16, 2013 |
HackTool:Win32/Keygen |
![]() |
possible-Threat.Hacktool.KMS Win32.Trojan.Agent.ET9SBN Keygen (PUA) |
54,842 | September 30, 2010 |
WebDiscover Browser | N/A | N/A | July 3, 2015 | |
STOP Djvu Ransomware | N/A | N/A | April 1, 2019 | |
$1000 Walmart Gift Card Winner Fake Pop-Up | N/A | N/A | January 24, 2012 | |
'Unlock this Page to Continue!' Virus | N/A | N/A | December 15, 2012 | |
Newsbreak.com | N/A | N/A | February 3, 2020 | |
PUP.ByteFence Anti-Malware |
![]() |
N/A | 39,424 | May 15, 2020 |
Ukash Virus |
![]() |
Pakes2_c.NRL W32/Foreign.AOV!tr Ransom:Win32/Urausy.E |
9,878 | June 15, 2012 |
Driver Pack Cloud | N/A | N/A | March 6, 2018 | |
Advance System Care |
![]() |
N/A | 10,154 | March 14, 2017 |
Windows Startup Repair |
![]() |
N/A | N/A | August 8, 2011 |
Fair Ransomware | N/A | N/A | December 1, 2020 | |
PUP.PC Accelerate |
![]() |
N/A | 39 | November 28, 2019 |
Google Redirect Virus |
![]() |
Trj/Genetic.gen Generic29.AKVZ W32/Kryptik.KO!tr |
15 | May 14, 2009 |
Registry Virus Scanner |
![]() |
N/A | 4 | April 19, 2011 |
Total Anti Malware Protection |
![]() |
N/A | 6 | May 5, 2012 |
Win32 malware.gen |
![]() |
PE:Trojan.Win32.Generic.13E8CDB3!334024115 VCS/Environment.DigitalFN Virus.Win32.Xpaj.1!O |
4,539 | July 5, 2010 |
NiceHash Miner | N/A | N/A | April 15, 2019 |
How Can You Detect Threat Database? Check for Threat Database with SpyHunter!
SpyHunter is a powerful malware remediation and protection tool designed to help provide users with in-depth system security analysis, detection and removal of a wide range of threats like Threat Database as well as a one-on-one tech support service.
Not Your OS? Download for Windows® and Mac®.
Free SpyHunter Remover Details & Terms
Threat Categories
We continuously collect and analyze data to detect emerging trends in new malware threats. Search the different types of threats provided below to help you identify and research on a particular threat that may be infecting your computer.
There are currently 26,578 threats listed on the threat database.
Threat Type | Threat Description |
---|---|
Advanced Persistent Threat (APT) | An Advanced Persistent Threat (APT) is a computer threat actor, most often operated or sponsored by nation-states. The aim of these groups aims at unauthorized access to computer networks for extended periods. The term may also be used... |
Adware | What is adware and is it malicious? Adware is usually associated with a pop-up or pop-under advertisements but can also secondarily perform other free services. The problem with most adware tools is the hidden intent or behaviors,... |
AOL Parasites | An AOL parasite is a malicious computer program designed to harm users of specific America Online software, especially AOL Instant Messenger (or AIM). It can also affect users of different applications such as ICQ messenger. An AOL... |
Backdoors | A backdoor (also known as a trap door or wormhole) in a computer system is a method of bypassing normal authentication, securing remote access to a computer, obtaining access to plaintext while attempting to remain undetected. Backdoors... |
Bad Toolbars | |
Banking Trojan | |
Botnets | If you use a computer and have access to the Internet, chances are high you've heard of a bot or botnet, but do you really know what each means and what they do? First of all, bot is a term that is short for robot. No, tiny robots (well,... |
Browser Helper Object | |
Browser Hijackers | A browser hijacker (sometimes called hijackware) is a type of malware program that alters your computer’s browser settings so that you are redirected to Web sites that you had no intention of visiting. Some browser hijacking can be... |
Browser Plugins | Browser plugins (sometimes called plugins, plug-ins, addin, add-in, addon, add-on, snap-in or snapin) are additional pieces of software that add extra capabilities to your web browser, such as the ability to view movies, run Java... |
Cookies | Computer cookies are used to personalize your online experience. Despite their benign name and useful purpose, however, cookies tend to cause security concerns among some Internet users, which is mainly due to the way they function. Many... |
Crack/Activator bad | |
Dialers | A dialer (US) or dialler (UK) is an electronic device that is connected to a telephone line in order to monitor the dialed numbers and alter them to seamlessly provide services that otherwise require lengthy access codes to be dialed. A... |
Fake Error Messages | Fake warning messages (sometimes referred to as fake error messages or fake security alerts), are deceptive notifications that usually appear in the form of pop-ups and/or a web page. These fake error messages are known to be associated... |
Fake Warning Messages | |
Flooders | Flooders are malicious programs that attempt to overload a connection by sending various intrusive attacks, in order to make a computer resource unavailable to its intended user. Examples of the various attacks implemented to... |
Keyloggers | Keystroke logging (often called keylogging) is the practice of noting (or logging) the keys struck on a keyboard. There are currently two types of keylogging methods, hardware and software based. Hardware key loggers are... |
Mac Malware | Mac Malware is a type of threat that effectively attacks an Apple Mac computer. Contrary to what many computer users think or have believed for many years, Mac computers are susceptible to malware threats and attacks. In fact, from our... |
Mail Bombers | In Internet usage, mail bombers (or e-mail bombers) are those that perpetrate a form of net abuse consisting of sending large volumes of e-mails to an address in an attempt to overflow the mailbox or overwhelm the server where the email... |
Malicious Toolbars | |
Malicious Websites | Malicious websites are described as multiple, overlapping browser windows, some of which contain no indication of their origins. An attacker could arrange windows in such a way as to trick you into believing that an unidentified dialog... |
Malware | Malicious software, or malware, is software specifically designed to operate on a system without the knowledge of the user or their consent. Malware comes in many shapes and forms, but it is mostly aimed at either collecting information... |
Misleading Programs | Misleading programs or applications intentionally misrepresent the security status of a computer. Misleading programs attempt to convince you that potential malware or security risks (usually nonexistent or fake) are infecting your... |
Mobile Malware | |
Network Management Tools | Network management refers to the activities, methods, procedures and tools that pertain to the operation, administration, maintenance and provisioning of networked systems. Operation deals with keeping the network (and the services... |
Nukers | A nuker is a malicious computer program similar to a Trojan that carries a destructive payload, thus its namesake. A nuker affects overall computer performance, Internet connection speed and attempts to severely damage or totally destroy... |
Phishing | Phishing (pronounced 'fishing') is an online attack strategy used by cybercriminals to deceptively gather or collect data. Stolen data could then be used to breach the security of online accounts, hack into websites, or aid in targeted... |
Potentially Unwanted Programs | The Internet is filled with free programs and tools making promises they fall short of, or that once installed performs unwanted acts. Potentially Unwanted Programs, also known as Possibly Unwanted Programs or PUPs, are scattered... |
Ransomware | Ransomware is a type of malware that generally prevents its victims from using their computer and accessing data, then demands some form of monetary ransom to allegedly restore access. Ransomware rose to prominence around 2005 and had... |
Remote Administration Tools | A Remote Administration Tool (known more commonly on the Internet as a RAT) is used to remotely connect and manage single or multiple computers with a variety of tools such as: Screen/camera capture and control. File management... |
Rogue Anti-Spyware Program | Rogue anti-spyware (or rogue security software) is an application that uses malware or malicious tools to advertise or install itself or to force computer users to pay for removal of nonexistent infections. Rogue anti-spyware will often... |
Rogue Anti-Virus Program | A rogue anti-virus program is a type of computer parasite not unlike that of a Trojan horse virus. Rogue anti-virus programs are typically installed onto your computer system due to web-surfing activities and the acceptance of... |
Rogue Defragmenter Program | |
Rogue Registry Cleaner | Rogue registry cleaners deceive you into thinking they are capable of fixing and cleaning your computer’s registry. Rogue Registry Cleaners use misleading security alerts and bogus registry scans as a method to get you to purchase the... |
Rogue Websites | |
Rootkits | A rootkit is a software system that consists of a program or combination of several programs designed to hide or obscure the fact that a computer system has been compromised. Contrary to what its name implies a rootkit does not grant you... |
Sniffers | A sniffer (also known as a packet or network analyzer, or for particular types of networks, an Ethernet sniffer or wireless sniffer) is computer software or computer hardware that can intercept and log traffic passing over a digital... |
Spam | What is Spam and who is behind it? First of all, we are not referencing the mystery meat jellied in a can, but rather unwanted electronic mail and messaging polluting the Internet. Spam is the electronic version of junk mail sent... |
Spyware | Spyware is computer software that is installed surreptitiously on a personal computer to collect information about a user, their computer or browsing habits without the user’s informed consent. However, while the term spyware suggests... |
Stealers | A Stealer is a Trojan horse type of malware that is known to collect information from an infected computer. Hackers and cybercrooks commonly utilize the data collected by a Stealer to access online accounts. Such data collected by... |
Tracking Cookie | |
Trojan Downloader | A Trojan downloader is usually a standalone program that attempts to secretly download and run other files from remote web and ftp sites. Typically Trojan downloaders download a numerous variety of Trojans and backdoors and activate them... |
Trojans | The Trojan horse, also known as Trojan, in the context of computing and software, describes a class of computer threats (malware) that appears to perform a desirable function but in fact performs undisclosed malicious functions. These... |
Viruses | A computer virus is a computer program that can copy itself and infect a computer without the permission or knowledge of the owner. The term “virus” is also commonly but erroneously used to refer to other types of adware, malware and... |
Vulnerability | A vulnerability threat is not necessarily a malicious application but a process or series of actions that hackers may leverage or take advantage of to attack a computer or server. Vulnerabilities are commonly discovered by hackers and... |
Worms | A computer worm is a self-replicating computer program. It uses a network to send copies of itself to other nodes (computers on the network) and it may do so without any user intervention. Unlike a virus, it does not need to attach... |
Search by Letter:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 0 1 2 3 4 5 6 7 8 9