Tritax
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Ranking: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
Threat Level: | 10 % (Normal) |
Infected Computers: | 17 |
First Seen: | February 14, 2014 |
Last Seen: | November 10, 2022 |
OS(es) Affected: | Windows |
Tritax is a family of rogue security programs. Fake security programs in the Tritax family are designed to trick inexperienced computer users into thinking that their machines are severely compromised with different kinds of threats. Tritax is used to generate revenue by convincing computer users that a bogus 'full version' of Tritax must be purchased. Threats in the Tritax family present a severe risk to your computer. Considering all of this, it is crucial to remove any vestige of Tritax from the infected computer with the help of a reliable, strong anti-malware product that is fully up-to-date.
Harmful Threats Such as Tritax Should be Removed ASAP
Rogue security programs like those in the Tritax family follow similar patterns when infecting computers. The following are characteristics of Tritax infections and of other types of fake security programs:
- Usually, Tritax is distributed using typical threat delivery methods. Typical infections occur due to attack websites, email spam and social engineering techniques. Tritax has recently been distributed using infected advertisement networks. Cybercrooks gain access to advertisement networks and use them to distribute compromised advertisements that claim to offer a free check-up for your computer. Clicking on a button on these advertisements labeled 'clean computer' results in the installation of threats in the Tritax family on the infected computer.
- Once installed, threats in the Tritax family take over the infected computer, making harmful changes to its settings in order to deceive computer users. Tritax will spam computer users with misleading error messages and fake threat scans in order to 'prove' to them that their machines are facing a serious risk.
- When computer users try to use the fake security program to disinfect the affected computer, additional error messages appear, prompting the PC user to pay for a 'complete version' of the fake security program. Of course, since Tritax is not capable of detecting or removing threats, being itself a threat, computer users should avoid paying for Tritax and instead remove Tritax at once.