category

istartsurf.com

istartsurf.com seems like a very useful search engine from the first sight: it allows computer users to access Facebook, eBay, YouTube, and other websites in just one click. ...

5 year ago
category

CryptoLocker

CryptoLocker is a screen locker infection else known as ransomware program. It is distributed by Trojan:Win32/Crilock.A Trojan and unlike other ransomware applications known to us, this one ...

6 year ago
category

Delta-Homes

Delta-Homes is a mischievous browser hijacker which can take over your home page and force you to use a highly suspicious and possibly dangerous search tool. At first ...

6 year ago

Dever Ransomware

Can you decrypt the files corrupted by Dever Ransomware? The attacker behind this malicious threat wants you to believe that you can do that using their assistance; however, our researchers do not recommend interacting with cybercriminals at any point. If you get involved, you could be exposed to new scams, and you might also be pushed into paying quite a lot of money for nothing in return. The attacker informs victims that they can pay a ransom to get their files restored, but it is not likely that they would be interested in the restoration part after obtaining the ...

4 days ago

FlowerPippi: A Devious Backdoor Trojan Employed by TA505

FlowerPippi is a backdoor that is closely associated with the infamous Gelup malware, and it is possible that it could be run on the infected machine with other threats at the same time. This malware is a threat for Windows users, and it has been specifically found to affect those living in Argentina, Japan, and the Philippines. Users living in the same region need to be cautious. Both FlowerPippi and Gelup belong to a group known by the name TA505. This malware was spotted in the summer of 2019, and its existence proved how sophisticated cybercriminals have become. Long ...

6 days ago

TurkStatik Ransomware

TurkStatik Ransomware encrypts files and adds the “.ciphered” extension to their original names. This threat can encrypt over 100 different types of files, including DOC, ZIP, RAR, MPG, AVI, or PDF, and it can encrypt them in all drives, including partitions, USB drives, and the network. Needless to say, this malware can make a huge mess, but it is not all bad news. A free decryptor called “TurkStatic Decryptor” has already been created by malware researchers, and if you can download it onto the infected machine, there is a good chance that all of the corrupted files will be ...

6 days ago

Afrodita Ransomware

Afrodita Ransomware uses a clever scam to slither into Windows operating systems. Our malware experts have found that the launcher of the threat is introduced to users using a fake document file sent to them via email. The name of this file could be “Invoice.xlsm,” and it is meant to convince you that the file represents important information. The message supporting this file attachment could be convincing too. If you are tricked into clicking the attachment, you are asked to enable macro, and if you do that, a malicious executable is downloaded in the form of an image file. ...

6 days ago

Stream+

Stream+ appears to be an extension that is classified as a potentially unwanted program. Its description says that it inserts “Sponsored Search results into Google Search.” It is probably safe to say that from an extension with this particular title, one might expect it would provide streaming content, but it seems its name has nothing to do with its purpose. Thus, if you thought you were downloading a tool that would provide you with streaming content, you might be left disappointed. In such a case, you may want to get rid of Stream+, especially if the idea of seeing more ...

6 days ago

CStealer

CStealer is a Trojan targeted at Windows systems. The malicious application was designed to steal passwords from Google Chrome browsers. According to cybersecurity experts, there are plenty of similar password stealers that can obtain a victim’s login credentials. Nonetheless, this malicious application is slightly unusual as it uses a MongoDB database to store stolen sensitive information. Apparently, this may allow other hackers who may gain the malware’s copy to retrieve stolen passwords from the database for themselves. Thus, if you end up receiving this malicious application, passwords stored on your Google Chrome could be exposed not just to the threat’s ...

6 days ago

My Flight Finder Tab

My Flight Finder Tab is introduced to Google Chrome users as a Productivity app on the Chrome web store (chrome.google.com/webstore/detail/my-flight-finder-tab/jcojppmbommbjimpoopbbgpkjbemnafa). Just recently, this strange extension was officially introduced to Chrome users at myflightfinder.net, but if you try visiting this website right now, you are shown a message indicating that the “product is temporarily unavailable.” Nonetheless, you can still download it using the installer found on flighttrackerupdate.com. The Privacy Policy found on this website suggests that the add-on was created by Eightpoint Technologies Ltd., a company that, allegedly, is located in the Cayman Islands. Our team is familiar with this company ...

6 days ago

Rising Sun

Rising Sun is a malicious application that was first used to attack various organizations in November 2018. Since it was determined that the malware uses a source code of a backdoor Trojan called Duuzer, cybersecurity experts believed that the new threat was released by the Trojan’s creators, who are North Korean hackers called the Lazarus Group. In 2019 the connection between these hackers and Rising Sun was finally confirmed after specialists discovered a malicious server named Operation Sharpshooter, which contained evidence on the earlier mentioned attacks. If you want to know more about this malicious application and Lazarus group, we ...

6 days ago

MediaConverterOnline Promos

MediaConverterOnline Promos was classified as a potentially unwanted program. It means that the application is not harmful, but it may have unwanted functionality that might make some users wish to get rid of it. Our researchers say that it might show advertisements and collect information related to users’ browsing activity. Some users may see such activities as annoying and violating their privacy. Thus, if you value your privacy and do not like seeing advertisements, you may want to erase MediaConverterOnline Promos. In such a case we can offer our removal instructions available below this article. To find out more ...

6 days ago

Anchor

Anchor is a family of malicious applications used for high-profile targets. The earliest observed sample was found in August 2018, while the most recent one was discovered in November 2019. Researchers say that hackers behind the latest campaign, in which such malicious applications were noticed, focused on attacking PoS (Point of Sale) systems. Also, it is vital to mention that the infection is linked to another threat called TrickBot. Further, in this text, we explain how these two infections are linked, how they work, and how they might be spread. For users who not only wish to learn more ...

9 days ago

InnfiRAT

There are many different kinds of malware waiting for the opportunity to attack you, and while some of them are ...

9 days ago

IconDown

IconDown is a malicious application that might have been created by hackers called BlackTech. It seems the cybercriminals are targeting ...

9 days ago

Gesd Ransomware

Gesd Ransomware looks like another threat from the Stop Ransomware family. Our researchers could not test it properly as its ...

9 days ago

Bitsran

If you have ever faced the malicious Hermes Ransomware 2.1, there is a good chance that Bitsran was responsible ...

9 days ago

Rote Ransomware

Rote Ransomware tricks users into thinking that they are installing Windows updates. In reality, the malware encrypts their files ...

9 days ago

MedusaLocker Ransomware

MedusaLocker Ransomware does not need your permission to attack your Windows operating system, but it is likely that it ...

9 days ago
Recently updated malware:

ABOUT SSL CERTIFICATES
pcthreat.com Webutation