category

istartsurf.com

istartsurf.com seems like a very useful search engine from the first sight: it allows computer users to access Facebook, eBay, YouTube, and other websites in just one click. ...

5 year ago
category

CryptoLocker

CryptoLocker is a screen locker infection else known as ransomware program. It is distributed by Trojan:Win32/Crilock.A Trojan and unlike other ransomware applications known to us, this one ...

5 year ago
category

Delta-Homes

Delta-Homes is a mischievous browser hijacker which can take over your home page and force you to use a highly suspicious and possibly dangerous search tool. At first ...

6 year ago

StreamMe

If you have downloaded the StreamMe extension onto your Google Chrome web browser, you must have expected it to provide you with free streaming services. After all, that is what the name of this PUP (potentially unwanted program) implies, and the image displayed on the Chrome web store – which is where the extension can be downloaded from – states that the app can help “Watch your favorite content 24/7.” This is what is used to lure users in. However, if you take a closer look, you should realize that the extension does not offer streaming services at all. ...

5 days ago

KBK Ransomware

What would you do if you knew there was a malicious infection targeting your personal files? Surely, you would try to avoid it. KBK Ransomware is that kind of infection, and if it has not taken hold over your personal files yet, it is crucial that you take all measures against it. First and foremost, secure your system, which you can do by employing reliable security software and by practicing safe browsing. Second, secure your personal files by creating backups. If you store copies of your personal files online or using external hard drives, you will always have replacements ...

5 days ago

Nuksus Ransomware

Nuksus Ransomware appears to be yet another malicious file-encrypting application from the so-called STOP Ransomware family. Our researchers report that it is a bit different from other threats from the mentioned family. It only encrypts personal files available on a computer and does not leave any ransom note. No ransom note means that the malware’s victims cannot contact its developers or pay a ransom. Oddly, the hackers do not demand anything. The other malicious applications from STOP Ransomware family that we encountered so far were created for money extortion. Therefore, it is possible that the threat could be still in ...

5 days ago

Dutan Ransomware

Dutan Ransomware is an encryptor, and once it corrupts your personal files, you might be unable to recover them. According to our research team, a free decryption tool created by malware researchers might exist, but it has not been effective with some of the more recent infections from the STOP Ransomware family, and so we cannot guarantee that you will be able to use it successfully. Of course, it is worth taking a chance if all of your personal files were corrupted, but you must be cautious. We have the same advice for the victims of Zatrov Ransomware, Vesrato Ransomware, ...

5 days ago

Pedro Ransomware

Pedro Ransomware is one of the STOP Ransomware versions that were created recently. The malware encrypts personal victims’ files the same as the variants created before it. Next, the malware ought to display a ransom note that claims a user has to pay 490 US dollars to get decryption tools. The sum is already with a 50 percent discount, and it is still a lot, which is why we do not recommend paying it if you do not want to risk losing such a sum in vain. It could happen despite what the malware’s developers may say. To get ...

5 days ago

GoldBrute

GoldBrute is a botnet, and attackers behind it can use it gain access to vulnerable operating systems. A botnets is a network of infected machines, which are known as bots, and the more bots there are, the more powerful the attackers can be. While some botnets are used solely for the purpose of spreading malware, others can use all bots collectively to perform DDoS (distributed denial of service) attacks against servers and networks. This can compromise websites, systems, and networks to mess with their functions. For example, a website under attack can become inaccessible. A company network under attack ...

5 days ago

Marcher Trojan Bypasses 2FA and Overlays Apps to Steal Information

Not all apps on your Android device are equal. Some of them were designed to entertain you, while others were created to make it easier for you to communicate with your loved ones or colleagues. While most apps are useful and legitimate, others can be malicious and dangerous. For example, they could be set up to conceal Marcher, a dangerous banking Trojan that attacks Android users specifically. According to Phishlabs, Marcher is one of the most widespread families of Android banking Trojans in the world, along with BankBot. Unfortunately, multiple different versions of this Trojan might exist, and it is ...

5 days ago

MGS Ransomware

Getting infected with malware is always bad news, and no one would ever want to deal with MGS Ransomware. It is a new infection from the Crysis Ransomware and Dharma Ransomware family. The program itself might not look like much, but it can easily turn your system into a locker that you cannot access anymore. It is important to remove MGS Ransomware from your computer as soon as possible, and then look for ways to restore your encrypted files. Please bear in mind that in some cases, it might not be possible to get your files back, and you may ...

5 days ago

Hermes666 Ransomware

Encountering Hermes666 Ransomware might make you regret not backing up your important files. That is because this malicious application encrypts personal data located on an infected computer with a secure encryption algorithm. Meaning, the only way to restore them is to decrypt them, and, unfortunately, to do so, you would need special decryption tools. Such means are usually available only to a ransomware application’s developers, except cases when cybersecurity specialists manage to create decryption tools by themselves. In such a case, the decryptor is usually shared online free of charge where anyone who may need it can download it. ...

10 days ago

Q1G Ransomware

If you let Q1G Ransomware into your operating system, this malicious infection will immediately encrypt all of your personal files. Your childhood photos, work documents, wedding videos, and other personal content could be encrypted, and when that happens, your files become unreadable. Unfortunately, you cannot employ programs available on your operating system or decryptors that are available online to read the corrupted files. That is because the attackers behind this malicious threat are using a complex algorithm to encrypt them, and, due to that, they are undecryptable. If you have backups stored online or on external drives, you do ...

10 days ago

Wal Ransomware

Cybercriminals are smart, and they know that you value your personal files. That is why Wal Ransomware is likely ...

10 days ago

Zatrov Ransomware

Zatrov Ransomware is a computer infection that can put you through a lot of tests. It might not look ...

10 days ago

Search Box Ds

Search Box Ds is an extension for Google Chrome that you might expect to work in a beneficial manner. ...

16 days ago

MedusaHTTP

MedusaHTTP is an HTTP-based botnet that is primarily used for DDoS (distributed denial of service) attacks. This infection is ...

16 days ago

Plague17 Ransomware

Plague17 Ransomware is a malicious computer infection that will take over your system unexpectedly. It is possible to avoid getting ...

16 days ago

Ecleneue.com

Have you ever been redirected to a random advertisement page when browsing the web? If you have, it is ...

16 days ago
Recently updated malware:

ABOUT SSL CERTIFICATES
pcthreat.com Webutation