category

istartsurf.com

istartsurf.com seems like a very useful search engine from the first sight: it allows computer users to access Facebook, eBay, YouTube, and other websites in just one click. ...

4 year ago
category

CryptoLocker

CryptoLocker is a screen locker infection else known as ransomware program. It is distributed by Trojan:Win32/Crilock.A Trojan and unlike other ransomware applications known to us, this one ...

5 year ago
category

Delta-Homes

Delta-Homes is a mischievous browser hijacker which can take over your home page and force you to use a highly suspicious and possibly dangerous search tool. At first ...

5 year ago

ABANTES Ransomware

ABANTES Ransomware is one annoying threat, and our research team can testify that. Once it slithers in, it not only encrypts files but also messes with the entire operating system. This threat was created using the Hidden Tear code, which has been used by quite a few well-known file encryptors. A few examples are BlackWorm Ransomware and BSS Ransomware. Although these threats might have been created by different malicious parties, they are all malicious, and we suggest deleting them for the same reasons. Of course, in this report, we focus on the removal of ABANTES Ransomware. The name of this ...

1 days ago

Pro Search TIp

Pro Search TIp is described as “the best search assistant for a great search experience.” Does it mean the application will display more accurate search results than other search engines, such as google.com or search.yahoo.com? Our researchers highly doubt it since it looks like the extension uses a modified google.com version to gather and display the results. Another thing users who encounter this tool ought to know is that the gathered results could be injected with targeted advertising content. Naturally, if you hate targeted ads and do not want to use a search engine that could show them to ...

1 days ago

GandCrab 5.0.9 Ransomware

GandCrab 5.0.9 Ransomware is the latest variant of the GandCrab Ransomware, a malicious file-encryptor that goes after personal files. The files are encrypted so that the victim – the owner of these files – could be pushed into paying the ransom. According to our malware researchers, the attackers promise a decryptor in exchange for this ransom, and it can range anywhere from $800 to $1600. That, allegedly, depends on how fast the victim reacts. This is a lot of money, and paying the ransom is not only financially disadvantageous but also extremely risky. The chances of you getting a ...

1 days ago

suppfirecrypt@qq.com Ransomware

suppfirecrypt@qq.com Ransomware encrypts various victim's files and adds a unique second extension to them. Files marked by it cannot be opened unless they are decrypted first, and to do so, the user needs decryption tools. Unfortunately, the hackers behind the malware might be the only ones who have such tools, but they are not willing to share them so quickly. According to their note, the malicious application’s developers want to be paid in Bitcoins, although they ask their victims to email them first. It might mean the price could be different to each user and as the threat’s note ...

1 days ago

Qinynore Ransomware

Qinynore Ransomware is a computer infection that you must take seriously. It is one of the many ransomware infections that have been terrorizing users around the globe for quite some time now. There isn’t much we can do when this program enters the target system. Perhaps the most important thing is to not panic. When you get infected with ransomware, your main objective should be removing Qinynore Ransomware from your system. You can do that by following the manual removal instructions right below this description. If you have further questions about ransomware infections, please do not hesitate a professional. Our ...

1 days ago

QP Ransomware

QP Ransomware comes from the Dharma/Crysis Ransomware family of malicious file-encrypting applications. This threat appends an additional extension called .aes to all victim’s personal data it manages to encrypt. The next malware’s step is to display a ransom note that explains how to contact the hackers. Of course, it should also say that the user would have to pay with Bitcoins to decrypt his files as well as explain how to obtain this particular cryptocurrency. Due to the fact it is possible the cybercriminals behind this malicious application may not hold on to their end of the bargain, we recommend ...

1 days ago

Sad Computer Ransomware

Sad Computer Ransomware encrypts user’s files if the user answers Yes to its displayed pop-up window that proposes to install antivirus software. In other words, the malicious application tricks its victims into believing it will provide a useful application, but instead encrypts their data with a robust encryption algorithm. Soon after the encryption process, the malware should show another window called Sad Computer. This window shows a text written in questions and answers form. In short, it explains the user will have to pay to get his data decrypted. Of course, dealing with the malicious application’s developers could be ...

1 days ago

Facebook Ransomware

What does Facebook Ransomware have to do with Facebook? Absolutely nothing. Our research team does not even believe that this threat could be spread using the popular social networking platform. Instead, it seems to spread using spam emails and vulnerable RDP channels. If you do not patch security vulnerabilities and do not pay attention to the emails you open and interact with, a malicious file-encrypting ransomware might slither in and attack. Note that the threat we are discussing in this report is not the only one that can attack and destroy your personal files. In fact, it is not ...

4 days ago

.PUMA Ransomware File Extension

If you see .puma or .pumas extension attached to almost all of your files, you probably infected your machine with a threat called .PUMA Ransomware File Extension. It is a malicious application that locks user’s data and then shows a note demanding for payment. In exchange, the note may suggest the user will receive decryption tools that could unlock all affected files. Even if you want to get your data back badly, we advise you not to make rash a decision. There is a possibility the malicious application’s developers could scam you. Plus, our researchers report there is a free ...

4 days ago

Vapor Ransomware

Creepy sounds and a black window with green text saying you have only around 48 hours to email the hackers; it sounds like you are dealing with Vapor Ransomware. Another detail that ought to allow you to confirm this is the malicious application that infected your computer is .VAPOR extension; it should be on all of the threat's encrypted files. Encrypted data cannot be opened unless you have decryption tools. The hackers claim they can provide them, but we would advise you to be cautious. These people could trick you into paying and then leave you without the promised ...

4 days ago

Trojan.Xwo

Sometimes malicious apps cannot do much on their own, and they work as supplements or components for other malware ...

8 days ago

QuickMapsAndDirections

QuickMapsAndDirections extension’s description encourages users never to get lost again as the application is promised to provide quick access ...

8 days ago

Delphimorix Ransomware

Delphimorix Ransomware may show a message asking to pay a ransom of 10 billion US dollars. No doubt, it is ...

10 days ago

Dablio Ransomware

Dablio Ransomware is the kind of malware that goes after your personal files. It uses an encryption algorithm to cipher ...

10 days ago

Delphimorix Red Ransomware

Sometimes malware programs seem to be a joke, but they still cause a lot of trouble. Delphimorix Red Ransomware ...

10 days ago

admin@decryption.biz Ransomware

admin@decryption.biz Ransomware opens a window titled Admin@decryption.biz as soon as it encrypts all targeted files, for example, user’s photos, various ...

10 days ago
Recently updated malware:

ABOUT SSL CERTIFICATES
pcthreat.com Webutation