category

istartsurf.com

istartsurf.com seems like a very useful search engine from the first sight: it allows computer users to access Facebook, eBay, YouTube, and other websites in just one click. ...

4 year ago
category

CryptoLocker

CryptoLocker is a screen locker infection else known as ransomware program. It is distributed by Trojan:Win32/Crilock.A Trojan and unlike other ransomware applications known to us, this one ...

5 year ago
category

Delta-Homes

Delta-Homes is a mischievous browser hijacker which can take over your home page and force you to use a highly suspicious and possibly dangerous search tool. At first ...

5 year ago

COPAN Ransomware

COPAN Ransomware is a dangerous computer infection that can lock up your files and leave you hanging. It is part of a big ransomware infection family, and it should actually help us deal with it, but the reality is that ransomware programs are really annoying, and they can be devastating. Luckily, it is rather easy to remove COPAN Ransomware from your computer because the infection tends to delete itself once the encryption is complete. So you can terminate any remaining files and then look for ways to restore your files. You should also employ all the measures necessary to avoid ...

5 days ago

Php Ransomware

Notes claiming files have been encrypted and asking to email back_me@foxmail.com suggest that a computer got infected with a threat named Php Ransomware. Its title comes from the .php extension that the malicious application appends to each enciphered file. Sadly, affected data becomes unusable without decryption tools, and the reason the malware’s developers want to be contacted is so they could try to convince victims to pay for the decryptor. The suggestion might seem tempting, especially if you have no other way to get your files back, but you should understand that dealing with cybercriminals is always risky as ...

6 days ago

Dqb Ransomware

Dqb Ransomware is a dangerous infection that was first spotted not too long ago. This malicious threat is part of the Dharma Ransomware family, and so it is not surprising that it is just a clone of many other well-known threats from the same group. Some of them include Basecrypt@aol.com Ransomware, 0day Ransomware, and suppfirecrypt@qq.com Ransomware. In most cases, the names of these clones are determined by the extensions appended to the corrupted files or the email addresses that the attackers instruct to send messages to. In this case, it is the extension. Once the infection strikes, the files are ...

6 days ago

Gelup

If Gelup is hiding on your system, it could be gathering information about you without you ever noticing anything. It looks like the malicious application is similar to our previously researched Trojan called FlowerPippi. Unlike the mentioned threat, this infection seems to be capable of restarting with a system. It means the malware might be able to relaunch itself after each reboot. Naturally, the only way to stop it from running on your computer and collecting data about you is to get rid of it. It might not be an easy task to remove Gelup manually, but if you ...

6 days ago

Dodger Ransomware

Dodger Ransomware has nothing to do with baseball. Maybe the attacker who is behind this malware is a fan, but, in general, there is no link or connection. The thing is that there are thousands of file-encrypting infections, and coming up with original names is no longer an easy task. Of course, the attackers themselves do not care how the victims recognize the infections, but they do add some identifying markers. In this case, for example, the “.dodger” extension is added to the files that are encrypted, and this is where the name of the infection derives from. Some victims ...

6 days ago

ChineseRarypt Ransomware

ChineseRarypt Ransomware is a file-encrypting threat created by cybercriminals from China. It uses a robust encryption algorithm to encrypt files on an infected device. The point of doing this is money extortion as, later on, the malicious application ought to display a ransom note. Like most of such messages, it asks to contact the malware’s developers via email and wait for further instructions. Victims should keep it in mind that these people cannot be trusted, as there are no guarantees they will hold on to their promises. If you do not think it would be a good idea to ...

6 days ago

BURAN Ransomware

BURAN Ransomware is an infection that is already fully established. In fact, several different versions of it exist, and it is possible that new ones will emerge in the future. These new versions display unique messages – although the file representing them is always the same – and they can add unique extensions to the corrupted files also. Our research team has established that this malware derives from two other well-known threats, which are Jamper Ransomware, and the original Vega Ransomware, also known as VegaLocker Ransomware. While we do not know if the same attacker is behind all three of ...

6 days ago

TROLL Ransomware

The moment you turn on your computer, you have to become vigilant and cautious. If you do not follow this advice, TROLL Ransomware could invade without you even realizing it. This malware might use different pathways into your Windows operating system, and something as innocent as opening a spam email could assist it. According to our malware research team, this threat is unlikely to stick to spam emails alone. It could also employ malware downloaders represented via malicious websites, as well as RDP vulnerabilities. Once in, the infection can do great damage because it is capable of encrypting files. ...

15 days ago

DDT Ransomware

The ranks of file-encrypting malware keep filling with new threats, and DDT Ransomware is one of the latest examples. Although we can identify it as a new threat, in reality, it is a new variant of a well-established infection, Globe Imposter 2.0 or Globeimposter Ransomware. This malware is dangerous, and restoring the files that it corrupts does not appear to be possible. Hopefully, your files were not corrupted by it yet, and you can focus on patching all security backdoors and securing your operating system. The infection can use misleading spam emails to trick you into letting it in ...

18 days ago

Basecrypt@aol.com Ransomware

You do not need to be a malware researcher to understand that Basecrypt@aol.com Ransomware got into your Windows operating system and encrypted your personal files. Once they are encrypted, the “.id-[code].[basecrypt@aol.com].BSC” extension is attached to their names. The email address embedded in the infection’s name is also represented as a title of the window that delivers the message from cyber attackers. The reality is that the creator of this malicious infection does not need to hide it once the encryption is complete. In fact, they need the victims to understand what has happened, and they need the victims to ...

18 days ago

Trojan.HyperBro

Trojan.HyperBro is a threat to anyone’s privacy as the malicious application might be able to record various information via the ...

18 days ago

SnowPicnic Ransomware

SnowPicnic Ransomware is another file-encrypting application that locks user’s files and displays a ransom note. By continue reading this ...

18 days ago

INPIVX Ransomware

INPIVX Ransomware is a ransomware program that is available for purchase at its official website. It means that virtually ...

18 days ago

Tracker Packages New Tab

Tracker Packages New Tab is one of the many potentially unwanted applications that work like browser extensions. Technically, there is ...

18 days ago

Poop Ransomware

Poop Ransomware is a malware based on an open-source program known as Hidden Tear that can be used for encrypting ...

18 days ago

Project57 Ransomware

Project57 Ransomware is an annoying infection that was first discovered a few months ago. This is not a very high ...

18 days ago
Recently updated malware:

ABOUT SSL CERTIFICATES
pcthreat.com Webutation