category

istartsurf.com

istartsurf.com seems like a very useful search engine from the first sight: it allows computer users to access Facebook, eBay, YouTube, and other websites in just one click. ...

5 year ago
category

CryptoLocker

CryptoLocker is a screen locker infection else known as ransomware program. It is distributed by Trojan:Win32/Crilock.A Trojan and unlike other ransomware applications known to us, this one ...

6 year ago
category

Delta-Homes

Delta-Homes is a mischievous browser hijacker which can take over your home page and force you to use a highly suspicious and possibly dangerous search tool. At first ...

6 year ago

DeathRansom Ransomware

DeathRansom Ransomware is a threat that, at the time of research, had two different versions. In both cases, the threat was meant to encrypt files and demand a ransom to be paid in return for an alleged decryptor. Although these versions are more similar than different, differences do exist, and we discuss them in this report. We also discuss how this malware spreads, and how you can protect your Windows operating system against it. Of course, our main goal is to help you remove DeathRansom Ransomware from your operating system, and so we also discuss the different options you can ...

5 days ago

Search Defender Live

Google Chrome users can download Search Defender Live from the Chrome web store. The installer is found at chrome.google.com/webstore/detail/search-defender-live/bdhnjgfhlpaehmmknelpglmdkfkiajah, and as soon as you click the ‘Add to Chrome’ button, you are informed that the extension can read and change your own data on the sites you visit, as well as change search settings. Is this extension a browser hijacker? We would not go this far, but we definitely can identify it as a potentially unwanted program (PUP). There are two main reasons for that. First of all, the services provided by this extension are not so great. Second, the ...

5 days ago

Zobm Ransomware

Zobm Ransomware enciphers photos, documents, and data alike. You can tell that your files were affected by this malicious application from the .zobm extension that should be at the end of each encrypted file’s name. The next thing you might notice if you receive this threat is its ransom note, which ought to be available via a document called _readme.txt. In such a case, we advise reading our full article so you could learn all the essential details about this malware. For users who came here to learn how to get rid of Zobm Ransomware, we can offer our removal ...

5 days ago

VeePN

VeePN is an extension that can provide VPN services for Google Chrome users. VPN applications are rather popular among users who want to ensure safe browsing as well as those who wish to access geographically restricted content on the Internet. If you are looking for such a program yourself and came across this extension, we recommend learning more about it first. According to our researchers, it has been classified as a potentially unwanted program. It means that the plugin could work in an annoying or undesirable manner. You can learn more about this VPN extension if you read the ...

5 days ago

Start Ransomware

When Start Ransomware attacks, it does that silently. However, you might have a part in the execution of this dangerous malware. According to our research team, this threat is likely to be spread using spam emails, and that means that you could be the one who opens the misleading message and then executes the infection’s launcher by opening a corrupted attachment. Of course, the email is convincing, and you might not suspect danger at all. Unfortunately, if you do not remove Start Ransomware the moment it slithers in, your files are encrypted. They are encrypted silently and quickly, and ...

6 days ago

Grod Ransomware

Grod Ransomware is named that way because it adds the “.grod” extension to the files that are corrupted by it. This extension has only one purpose, and that is to mark the corrupted files. While you can easily delete this extension, you do not need to waste your time with that. Unfortunately, if you change the name, your files will remain unreadable, and they are unreadable because the data inside was encrypted. Once a file is encrypted, a special decryptor is needed, and, unfortunately, it does not look like you can just download one. A free decryptor called “STOP Decrypter” ...

6 days ago

MarioLocker Ransomware

MarioLocker Ransomware is a bit different from other ransomware applications that we usually encounter. Even though this threat does encrypt various files located on an infected computer and shows a message, it does not provide instructions on how to pay a ransom and get your data decrypted. Most of such malicious applications are used for money extortion, but, under such circumstances, it is possible that the malware’s developers had something else in mind. Perhaps, they created it to ruin someone’s files individually or, maybe, the threat is still in development, and its later versions might start showing a message ...

6 days ago

SaveTheQueen Ransomware

SaveTheQueen Ransomware is a computer infection that is probably still under development. While this program is more than capable to encrypt target files, it doesn’t say anything about decryption. Thus, we can assume that the people behind this infection are still working on it, and a new version should emerge soon enough. Nevertheless, if you got infected with this ransomware, you clearly need to remove SaveTheQueen Ransomware from your system as soon as possible. It might take some time to restore your files, but you can always address a professional who will let you know all the possible file recovery options. The ...

6 days ago

ABCD ransomware

ABCD ransomware is a dangerous computer infection that doesn’t have a public decryption tool. Therefore, dealing with the infection might be slightly challenging. However, you shouldn’t lose hope because there is always a way to retrieve at least some of your files. This program deletes itself when the file encryption is complete, but there might be some files left so you can get rid of them when you are set to remove ABCD ransomware (or what’s left of it). As for your files, you might have to go through a number of file recovery options together with a local ...

6 days ago

Msop Ransomware

Msop Ransomware is a threat you might find on your system if you are not careful enough while surfing the Internet or if your system has any weaknesses. If it happens, all of your files could become encrypted as the malware enciphers data on infected devices with a strong encryption algorithm. Files that get affected ought to be marked with the .msop extension, and you should be unable to open them. To restore files, the malicious application’s developers may propose you pay a ransom to get decryption tools that could decrypt all of your files. You should understand that doing ...

6 days ago

TheEasyWayPro

TheEasyWayPro is meant to make it easy for you to access maps and find directions, which suggests that it ...

6 days ago

Purple Fox

Purple Fox is a malicious application that downloads malware on its infected systems. Researchers say that it travels with a ...

12 days ago

Kuub Ransomware

Kuub Ransomware is the infection responsible for adding the “.kuub” extension to your personal files. Unfortunately, this infection does ...

12 days ago

Retadup

Retadup is a malicious, self-propagating Windows worm that was invading vulnerable systems located in the countries of Latin America, ...

12 days ago

Skipper

Skipper appears to be a backdoor Trojan that was created and used by a group of Russian cybercriminals known as ...

12 days ago

Li Ransomware

Li Ransomware was created for money extortion as it encrypts users’ files and shows a message in which its developers ...

12 days ago
Recently updated malware:

ABOUT SSL CERTIFICATES
pcthreat.com Webutation