Home » How to remove » Malicious process

Malicious process

CallerSpy spyware masks as an Android chat application

Android Spyware CallerSpy

Trend Micro experts discovered the malware CallerSpy, which masks as an Android chat application and, according to researchers, could be part of a larger spyware campaign. Malware targeted at Android users, designed to track calls, text messages and so on. “We found a new spyware family disguised as chat apps on a phishing website. We believe that the apps, which …

Read More »

Remove Taskngr.exe Miner: Easy Steps To Uninstall

A brand-new, very hazardous cryptocurrency miner virus has actually been discovered by protection researchers. The malware, called Taskngr.exe can contaminate target victims making use of a variety of means. The main point behind the Taskngr.exe miner is to employ cryptocurrency miner activities on the computers of targets in order to acquire Monero symbols at targets expense. The result of this …

Read More »

Lsma12.exe – Virus Files Removal

A brand-new, very dangerous cryptocurrency miner virus has actually been detected by security scientists. The malware, called Lsma12.exe can contaminate target victims using a variety of ways. The essence behind the Lsma12.exe miner is to employ cryptocurrency miner activities on the computers of victims in order to get Monero symbols at sufferers expenditure. The result of this miner is the …

Read More »

Remove WmiHost.exe Miner Trojan

A new, very unsafe cryptocurrency miner infection has actually been identified by security researchers. The malware, called WmiHost.exe can infect target victims using a selection of methods. The main idea behind the WmiHost.exe miner is to employ cryptocurrency miner tasks on the computers of victims in order to obtain Monero tokens at targets cost. The outcome of this miner is …

Read More »

Winnts.exe suspicious process removal guidelines.

Winnts.exe is a process that may be quickly mapped in your Task Manager as active. This implies that the process was started after you transformed your computer system on. You might right-click on the process and choose the option to open up the folder which contains it. This will certainly bring you to [keyword2] folder and also you will see …

Read More »

The famous infostealer “Agent Tesla” has an unusual dropper

Unusual dropper of Agent Tesla

Cisco Talos discussed a malicious campaign aimed at stealing user credentials and other important information. They reported that the Agent Tesla infostealer had an unusual dropper. The malware, whose attacks began in January, uses the original bootloader to bypass anti-virus protection and inject its code into a legitimate process on an infected machine. The payload is Agent Tesla, a well-known …

Read More »

Zikouta.exe questionable process removal guidelines.

Zikouta.exe is a process that might be quickly mapped in your Task Manager as energetic. This means that the process was started after you transformed your computer system on. You might right-click on the process and also pick the option to open up the folder which contains it. This will bring you to [keyword2] folder and you will certainly see …

Read More »

How To Remove Uihost32.exe CPU Miner Virus

A brand-new, extremely hazardous cryptocurrency miner virus has been detected by safety and security researchers. The malware, called Uihost32.exe can infect target sufferers using a range of ways. The main point behind the Uihost32.exe miner is to employ cryptocurrency miner tasks on the computer systems of targets in order to obtain Monero tokens at sufferers expenditure. The result of this …

Read More »

Malware in popular Android keyboard could cost users $18 million

Keyboard malware for Android

Secure-D and Upstream Systems experts found that ai.type, a popular Android keyboard, was infected with malicious code, and users could lose about $18 million because of this. Recalling, discovery of malware as part of the application was first reprorted last summer. Then, experts revealed on Google Play many applications infected with a clicker trojan, among which was ai.type installed more …

Read More »

Chinese hackers create Messagetap malware that can steal SMS from operator networks

Messagetap can steal SMS

FireEye experts discovered the messagetap malware, which can steal sms and mobile networks. Chinese government hackers created it. The malware is designed for Linux machines and was created to be hosted on SMSC (Short Message Service Center) servers, which are responsible for the operation of the short message service in the networks of telecom operators. Malware helps to “listen” to …

Read More »

Delete RegCtrl.exe CPU Miner

A brand-new, extremely hazardous cryptocurrency miner virus has been identified by protection scientists. The malware, called RegCtrl.exe can contaminate target victims using a variety of ways. The main idea behind the RegCtrl.exe miner is to utilize cryptocurrency miner activities on the computers of targets in order to get Monero tokens at sufferers cost. The end result of this miner is …

Read More »

Researchers found serious vulnerability in NFC-app for Android

Vulnerability in Android NFC Application

Checkmarx specialists revealed details of a dangerous vulnerability in an NFC application for Android. Attackers can exploit a bug that allows manipulating NFC tags to redirect victims to a malicious site and other purposes. The developers fixed the bug in the latest version of the OS, but will not eliminate it in previous releases. The error was identified in the …

Read More »

Program for data theft Raccoon settled on 100 thousand PCs and is gaining popularity

Raccoon data theft program

In criminal circles, the new data-stealing program, Raccoon, is rapidly gaining popularity. For several months, this information stealer, according to Cybereason, managed to infect more than 100 thousand Windows machines in North America, Western Europe and Asia. The malware is not particularly complicated and does not use innovative techniques, but the business model of its creators – MaaS – allows …

Read More »

Malware turns Discord messenger into backdoor and forces to steal data

Malware turns Discord into a backdoor

Information security specialist MalwareHunterTeam discovered the Spidey Bot malware, which turns Discord for Windows into a backdoor and a tool for spying and stealing information. Since Discord is an Electron application, almost all of its functionality is based on HTML, CSS and JavaScript, which allows attackers to modify key files and force the client to engage in malicious activity. “Saying …

Read More »

Best Guide to Remove Ntdsapi.exe Forever

A brand-new, really harmful cryptocurrency miner infection has actually been spotted by protection researchers. The malware, called Ntdsapi.exe can infect target victims utilizing a range of means. The main idea behind the Ntdsapi.exe miner is to employ cryptocurrency miner activities on the computer systems of victims in order to get Monero tokens at targets expense. The end result of this …

Read More »

Researchers found vulnerabilities in eRosary smart rosaries from Vatican developers

ERosary smart rosary vulnerabilities

Researchers found vulnerabilities in the eRosary smart rosary, which the Vatican developers had previously introduced. The creators of the product did not protect user accounts from third-party interference and left attackers with access to private information. “It took just 10 minutes to find data-divulging demons corrupting Pope’s Click to Pray eRosary app. Vatican coders exorcise API gremlins but, we must …

Read More »

KRACK Vulnerability Threats Millions of Amazon Echo and Kindle Devices

KRACK for Amazon Echo and Kindle

Millions of 1st generation Amazon Echo smartphones and 8th generation Amazon Kindle e-books have been affected by two dangerous vulnerabilities (CVE-2017-13077 and CVE-2017-13078) that allow for attacks with key reinstallation (Key Reinstallation Attack, KRACK). KRACK is a replay attack on any Wi-Fi network with WPA2 encryption. All secure Wi-Fi networks use a 4-step “handshake” scheme to generate a cryptographic key. …

Read More »

Virus VID001.exe Trojan coming back

A new, really dangerous cryptocurrency miner virus has been spotted by safety scientists. The malware, called VID001.exe can contaminate target sufferers using a variety of ways. The main point behind the VID001.exe miner is to use cryptocurrency miner activities on the computer systems of victims in order to get Monero symbols at targets expenditure. The result of this miner is …

Read More »

Virus Uihost64.exe Trojan coming back

A new, really dangerous cryptocurrency miner virus has been identified by protection researchers. The malware, called Uihost64.exe can contaminate target victims utilizing a range of means. The main point behind the Uihost64.exe miner is to use cryptocurrency miner activities on the computers of targets in order to acquire Monero symbols at targets expenditure. The end result of this miner is …

Read More »

Remove Lsma.exe Miner Trojan

A brand-new, really harmful cryptocurrency miner virus has actually been discovered by protection scientists. The malware, called Lsma.exe can contaminate target sufferers utilizing a selection of means. The essence behind the Lsma.exe miner is to utilize cryptocurrency miner activities on the computer systems of sufferers in order to acquire Monero tokens at sufferers expense. The result of this miner is …

Read More »

Lsmma.exe Miner Virus – How to Remove It

A new, extremely hazardous cryptocurrency miner infection has been identified by safety and security scientists. The malware, called Lsmma.exe can infect target victims utilizing a range of ways. The main idea behind the Lsmma.exe miner is to employ cryptocurrency miner activities on the computer systems of sufferers in order to obtain Monero tokens at victims expenditure. The outcome of this …

Read More »

Attackers actively use the fresh Checkm8 jailbreak for their own purposes

Attackers use Checkm8 jailbreak

Cisco Talos experts warned users that attackers are actively using Checkm8 jailbreak. At the end of September 2019, an information security researcher known as axi0mX published an exploit, suitable for jailbreaking of virtually any Apple device with A5 to A11 chips released between 2011 and 2017. The development was called Checkm8 and is very significant, as it exploits a vulnerability …

Read More »

Tarmac malware attacks MacOS users

Tarmac Malware MacOS attacks

Confiant found that malicious ad campaigns in the US, Italy and Japan were spreading the Tarmac malware, targeted at MacOS users. The goals of the wrecker, as well as its functionality, have not yet been fully studied. “Cyber criminals, APT groups, nation state actors, are extensively targeting Apple iOS/MacOS devices for various reasons: continuous innovation and development of Apple platforms …

Read More »

Cudac.exe – Virus Files Removal

A brand-new, really harmful cryptocurrency miner virus has been discovered by safety and security researchers. The malware, called Cudac.exe can infect target victims utilizing a range of ways. The main idea behind the Cudac.exe miner is to employ cryptocurrency miner activities on the computers of sufferers in order to get Monero symbols at targets expense. The result of this miner …

Read More »

Hackers attacked Volusion cloud-based e-commerce platform

Hackers attacked Volusion Platform

Attackers compromised Volusion’s cloud-based e-commerce platform infrastructure. Hackers attacked it and injected a malicious code that steals bancard data entered by users into online forms. Currently, the malicious code has not yet been removed from the Volusion servers, and it still compromises the company’s client stores. It is already known that 6,500 stores were affected by this attack, but in …

Read More »

How to remove EthDcrMiner64Etc.exe CPU Miner Trojan

A brand-new, extremely harmful cryptocurrency miner virus has been found by safety and security researchers. The malware, called EthDcrMiner64Etc.exe can infect target victims using a selection of ways. The main idea behind the EthDcrMiner64Etc.exe miner is to utilize cryptocurrency miner activities on the computers of victims in order to acquire Monero tokens at sufferers expenditure. The outcome of this miner …

Read More »

Vulnerability in WhatsApp allows access to the device using a gif-picture

WhatsApp vulnerability gif access

A security researcher with the pseudonym Awakened discovered a vulnerability in the popular WhatsApp messenger that could allow attackers to access files and messages of a victim using a malicious GIF image. The problem is the double-free memory vulnerability — an anomaly in memory corruption that could cause an application to crash or, even worse, provide an attacker with a …

Read More »

Get Rid of Driver-windows.exe Miner Virus Completely

A new, very unsafe cryptocurrency miner infection has actually been spotted by safety and security scientists. The malware, called Driver-windows.exe can infect target victims using a variety of means. The main idea behind the Driver-windows.exe miner is to utilize cryptocurrency miner tasks on the computer systems of targets in order to acquire Monero symbols at sufferers cost. The end result …

Read More »

Developers released a patch for the 0-day bug in vBulletin, but it turned out that the vulnerability had been exploited for years.

vBulletin vulnerability exploited for years

Yesterday it was reported that a certain anonymous researcher published in the public domain details of the dangerous zero-day vulnerability in the vBulletin forum engine, as well as an exploit for it. Now it turned out that this vulnerability has been exploited for years. The bug allows an attacker to execute shell commands on a vulnerable server. Moreover, an attacker …

Read More »