category

istartsurf.com

istartsurf.com seems like a very useful search engine from the first sight: it allows computer users to access Facebook, eBay, YouTube, and other websites in just one click. ...

4 year ago
category

CryptoLocker

CryptoLocker is a screen locker infection else known as ransomware program. It is distributed by Trojan:Win32/Crilock.A Trojan and unlike other ransomware applications known to us, this one ...

5 year ago
category

Delta-Homes

Delta-Homes is a mischievous browser hijacker which can take over your home page and force you to use a highly suspicious and possibly dangerous search tool. At first ...

5 year ago

BooM Ransomware

Your personal files are more vulnerable than you think, and BooM Ransomware proves it. While your files are always at risk of being accidentally deleted or lost due to technical issues, they can also be corrupted by malware. The ransomware can encrypt them, and that means that it can change data to prevent you from reading it. Once a file is encrypted, a decryptor must be applied; otherwise, it remains unreadable. That means that cyber criminals are in full control here, which is why preventing the threat from slithering in is the most important task. If it has slithered in ...

8 days ago

raphaeldupon@aol.com Ransomware

The devious raphaeldupon@aol.com Ransomware is a new variant of Crysis/Dharma Ransomware. This malware has quite a few different variations, and every single one of them poses a danger to your virtual security. Our research team warns that various pathways could be used to spread this malware, but spam emails are likely to be used most frequently. So, if you do not want to let this threat in, make sure you are extremely cautious about the emails you open and the attachments or links you click. The entrance of this malware is silent, and so you are unlikely to notice it, ...

8 days ago

BlackWorm Ransomware

BlackWorm Ransomware is a somewhat troublesome malicious application since it encrypts user’s data and blocks various processes to make it more difficult for the victim to delete it. Also, it shows a ransom note asking to pay 200 US dollars in exchange for decryption tools. The sample we tested did not provide a Bitcoin wallet address to transfer the money, which suggests the application could still be in the development mode. Dealing with hackers could be hazardous in any way, and so we would not recommend paying the ransom even if there was a way to make the transfer. ...

8 days ago

Spiteful Doubletake Ransomware

Spiteful Doubletake Ransomware is a malicious infection that invades Windows operating systems. Our research has analyzed and tested this threat, and it is pretty clear that it has not been completed yet or that it was not created for mass attacks. Although the infection has been spotted in the wild, the sample we tested did not encrypt files or work in an intended manner. That being said, the threat is real, and to ignore it would be a mistake. There is a possibility that it could be spread more aggressively. Also, its functions could be updated, and the threat ...

8 days ago

Cyspt Ransomware

Cyspt Ransomware is the infection responsible for adding the “.OOFNIK” extension to your personal files. Of course, that is not the worst thing that it does. In fact, the extension is pretty much harmless, and you can even delete it if it bothers you. Unfortunately, that is not a solution to the bigger problem, which is that your personal files are encrypted. What does that mean? A special algorithm was used to encode the data of the file to ensure that it cannot be read. That means that, for example, if you try to open “example.jpg.OOFNIK,” you will not ...

8 days ago

Juwon Ransomware

Juwon Ransomware, also known as Jw Ransomware, is a threat that could become a big problem for Windows users. At the time of research, this malware was neither spreading nor encrypting files as expected, and that leads us to believe that its developer is still perfecting it. Of course, it is always possible that this threat could just vanish due to its ineffectiveness, but it is also possible that it could strike at full force. Due to this possibility, we need to look at this ransomware as a serious threat. Hopefully, no one faces it, but if you read this ...

8 days ago

TrumpHead Ransomware

Cyber attackers are building a new file-encrypting threat, and it is called TrumpHead Ransomware. The name is random, and it has nothing to do with Trump or politics in general. This is not surprising at all, considering that the infection was built using the Hidden-Tear code that is publicly available. Other threats created using the same code have names that are just as random, including BSS Ransomware, SnowPicnic Ransomware, or ShutUpAndDance Ransomware. Just like most threats from this family, the one discussed in this report does not appear to be finished yet. When will it be finished? The truth ...

9 days ago

XARCryptor Ransomware

XARCryptor Ransomware is an infection that our research team is already familiar with. It is a new variant of the GarrantyDecrypt Ransomware, which has been reported on this website in the past. If you are curious to see how different or similar these infections are, or if you want to learn more about the removal of the predecessor, check the guide. In this report, of course, we focus on the new variant, and, needless to say, it is just as malicious. It can encrypt files, and then it can push you to do something you shouldn’t. Although the message ...

9 days ago

Cossy Ransomware

If you were hit by Cossy Ransomware, it is very likely that Russian is your native language. This threat is written in Russian, and it is unlikely that it would be used to target those who don’t understand it. Our research team informs that the infection was coded in C++, and its launcher could be spread using spam emails, vulnerability exploits, or other infections. Without a doubt, if other threats are involved in the execution of the file-encrypting ransomware, you need to find and delete them as soon as possible. A legitimate malware scanner can help you uncover threats that ...

9 days ago

IEncrypt Ransomware

IEncrypt Ransomware enciphers files and marks them with .cmsnwned extension. It is doubtful regular users will come across it, as it looks like the threat is targeted at organizations only. To our knowledge, the first targeted victim could have been CMS Nextech, as the ransom note shown while testing it mentioned its name. So far it is unknown whether the hackers behind the threat have released other versions attacking different organizations. Nonetheless, we believe it is essential to spread awareness about the malicious application. Therefore, further in the text, we will provide details about its possible distribution channels, its behavior, ...

9 days ago

ANATOVA Ransomware

ANATOVA Ransomware is one of those infections that were created to help cyber criminals make money. Needless to say, ...

17 days ago

XCry Ransomware

XCry Ransomware enciphers almost all files it finds on the infected device. According to our researchers, it should skip data ...

17 days ago

PDF Maker

If you need to convert some kind of file to PDF format for free, you might come across PDF Maker. ...

17 days ago

Baysearch.co

It is very often that even the most innocent applications can lead to a number of cybersecurity issues. Baysearch.co is ...

17 days ago

xiti.com

Tracking cookies are not immediate security threats, but it is always a good idea to stay away from them. You ...

11 year ago

Gorgon Ransomware

Gorgon Ransomware might be widely distributed since the message it shows is written in three different languages. However, we ...

17 days ago
Recently updated malware:

ABOUT SSL CERTIFICATES
pcthreat.com Webutation