Home » How to remove » Trojan (page 2)

Trojan

Password-stealing malware LokiBot started hiding its code in pictures

LokiBot malware uses steganography

The famous LokiBot malware now uses steganography as an extra layer of obfuscation. Researchers at Trend Micro have recorded a new variant of the malware and conducted its analysis. Apparently, the authors are now actively finalizing and improving LokiBot. “Our analysis of a new LokiBot variant shows that it has improved its capabilities for staying undetected within a system via …

Read More »

Gwmndy botnet turns Fiberhome routers into nodes for SSH tunneling

Gwmndy attack Fiberhome routers

360 Netlab experts have discovered a new, very unusual botnet Gwmndy that attack Fiberhome routers. The botnet is growing quite slowly – in just one day, only 200 devices are added to it. “Unlike typical botnets that are trying to infect as many victims as possible, this one stops searching for new bots, gaining 200 per day. It seems that …

Read More »

IgfxTry.exe – Virus Files Removal

A new, really hazardous cryptocurrency miner infection has actually been found by safety researchers. The malware, called IgfxTry.exe can contaminate target victims utilizing a range of methods. The essence behind the IgfxTry.exe miner is to utilize cryptocurrency miner tasks on the computers of victims in order to acquire Monero symbols at targets’ cost. The end result of this miner is …

Read More »

Rocke’s new cyberminer removes competitors and uses GitHub to communicate with C2

Malicious crypto mining by Rocke

Specialists at Palo Alto Networks have discovered a new technique for malicious crypto mining by Rocke group. The malware not only removes all other competing miners in the system, but also uses the GitHub and Pastebin services as part of the C2 command center infrastructure. “Cybercriminals write malicious components in Python, while Pastebin and GitHub are used as code repositories”, …

Read More »

Crowdstrike study: threats to mobile devices have become much more sophisticated and dangerous

Mobile threats more dangerous

Crowdstrike researchers have prepared a report that analyzes malware and other cyber threats for mobile devices. According to experts, attacks on smartphones have recently become significantly more complicated and dangerous. Previously, the main problem for smartphone and tablet users was clickjacking. However, now people are increasingly connecting their lives with mobile devices – they store important data, billing information etc. …

Read More »

Remove WMIProviderHost.exe Miner: Removal process

A new, really unsafe cryptocurrency miner infection has actually been discovered by protection researchers. The malware, called WMIProviderHost.exe can infect target sufferers utilizing a variety of means. The main point behind the WMIProviderHost.exe miner is to utilize cryptocurrency miner activities on the computer systems of victims in order to obtain Monero symbols at sufferers cost. The result of this miner …

Read More »

The new version of the banking Trojan TrickBot “kicks off” Windows Defender

TrickBot turn off Windows defender

The developers of the famous banking Trojan TrickBot are constantly improving their program.This time, the cybercriminals taught the TrickBot to turn off Windows Defender. Many users rely on Windows Defender, since it is an antivirus built into Windows 10. MalwareHunter Team investigated this process. After launching this version of TrickBot, the Trojan performs the following steps: Disables and then deletes …

Read More »

Delete Chkdiskmgr.exe CPU Miner

A new, very dangerous cryptocurrency miner virus has been identified by safety researchers. The malware, called Chkdiskmgr.exe can infect target sufferers using a variety of ways. The essence behind the Chkdiskmgr.exe miner is to employ cryptocurrency miner tasks on the computers of targets in order to acquire Monero symbols at targets expense. The result of this miner is the elevated …

Read More »

MyDoom worm is already 15 years old, but it is still active

MyDoom worm still active

Experts from Palo Alto Networks published a report, according to which 15-year-old MyDoom worm (aka Novarg, Mimail and Shimg) is not just still “alive”, but even increases its activity. MyDoom appeared in 2004 and is considered one of the most famous threats in the entire history of observations. “While not as prominent as other malware families, MyDoom has remained relatively …

Read More »

Delete Sqlagentc.exe CPU Miner

A new, really unsafe cryptocurrency miner infection has actually been spotted by safety researchers. The malware, called Sqlagentc.exe can contaminate target sufferers making use of a range of methods. The main idea behind the Sqlagentc.exe miner is to use cryptocurrency miner tasks on the computers of targets in order to get Monero symbols at victims cost. The result of this …

Read More »

Hackers attack Jira and Exim servers to install Watchbog Linux Trojan

Trojan Watchbog

Cybercriminals attack vulnerable Jira and Exim servers in order to infect them with the new version of Linux-Trojan Watchbog and Monero cryptocurrency mining. Watchbog is a malicious software for infecting Linux-based servers by operating vulnerable software, such as Jenkins, Nexus Repository Manager 3, ThinkPHP or Linux Supervisord. According to a researcher from Intezer Labs, the latest version of the malware …

Read More »

Virus Atlthunk.exe Trojan coming back

A new, very hazardous cryptocurrency miner virus has been spotted by safety and security scientists. The malware, called Atlthunk.exe can contaminate target victims utilizing a selection of means. The main point behind the Atlthunk.exe miner is to use cryptocurrency miner tasks on the computers of victims in order to acquire Monero tokens at targets cost. The outcome of this miner …

Read More »

Remove Helper.exe: complete and effective removal guide

A new, very unsafe cryptocurrency miner virus has been identified by safety scientists. The malware, called Helper.exe can infect target victims utilizing a selection of means. The main point behind the Helper.exe miner is to utilize cryptocurrency miner tasks on the computer systems of sufferers in order to obtain Monero tokens at victims expenditure. The outcome of this miner is …

Read More »

Iranian hackers APT34 use LinkedIn to deliver a backdoor

APT34 using LinkedIn for deliver a backdoor

The cybercrime group APT34, which is associated with the Iranian government, continues its espionage campaigns, using LinkedIn for deliver a backdoor. According to the report of FireEye experts, criminals appear to be a researcher from Cambridge and ask the victims to join their group. A malicious xls file is sent along with these users. “In late June, FireEye researchers discovered …

Read More »

Get Rid of Kryptex0_100.exe Miner Virus Completely

A new, extremely dangerous cryptocurrency miner infection has been identified by protection scientists. The malware, called Kryptex0_100.exe or similar Kryptex0_80.exe can infect target sufferers utilizing a variety of ways. The essence behind the Kryptex0_100.exe miner is to utilize cryptocurrency miner activities on the computers of targets in order to get Monero symbols at targets’ expenditure. The end result of this …

Read More »

Get Rid of Vcc2.exe Miner Virus Completely

A brand-new, extremely unsafe cryptocurrency miner virus has actually been spotted by safety scientists. The malware, called Vcc2.exe can contaminate target victims utilizing a selection of ways. The main point behind the Vcc2.exe miner is to use cryptocurrency miner activities on the computer systems of targets in order to obtain Monero symbols at victims expenditure. The result of this miner …

Read More »

Wecapi.exe – Virus Files Removal

A brand-new, very unsafe cryptocurrency miner virus has been spotted by safety and security scientists. The malware, called Wecapi.exe can contaminate target sufferers using a selection of means. The main idea behind the Wecapi.exe miner is to utilize cryptocurrency miner activities on the computer systems of targets in order to obtain Monero symbols at targets expense. The end result of …

Read More »

How Can I Remove Mscories.exe?

A brand-new, really harmful cryptocurrency miner infection has actually been detected by safety scientists. The malware, called Mscories.exe can infect target victims utilizing a variety of means. The essence behind the Mscories.exe miner is to use cryptocurrency miner tasks on the computer systems of victims in order to acquire Monero tokens at sufferers expense. The outcome of this miner is …

Read More »

Delete Emulation.exe CPU Miner

A new, really unsafe cryptocurrency miner infection has been spotted by protection researchers. The malware, called Emulation.exe can infect target victims making use of a selection of ways. The main point behind the Emulation.exe miner is to use cryptocurrency miner activities on the computer systems of victims in order to get Monero symbols at targets’ expenditure. The outcome of this …

Read More »

Delete RemoveDeviceContextHandler.exe CPU Miner

A brand-new, really unsafe cryptocurrency miner infection has actually been spotted by security scientists. The malware, called RemoveDeviceContextHandler.exe can contaminate target victims making use of a selection of methods. The main idea behind the RemoveDeviceContextHandler.exe miner is to utilize cryptocurrency miner tasks on the computer systems of sufferers in order to obtain Monero tokens at victims cost. The outcome of …

Read More »

Remove Intele.exe Miner: Easy Steps To Uninstall

A brand-new, really hazardous cryptocurrency miner virus has actually been discovered by safety and security scientists. The malware, called Intele.exe can infect target sufferers utilizing a selection of means. The main point behind the Intele.exe miner is to employ cryptocurrency miner tasks on the computers of sufferers in order to get Monero symbols at sufferers expenditure. The outcome of this …

Read More »

Winbrand.exe Miner Virus – How to Remove It

A brand-new, extremely dangerous cryptocurrency miner virus has actually been found by safety scientists. The malware, called Winbrand.exe can infect target sufferers making use of a range of methods. The main idea behind the Winbrand.exe miner is to employ cryptocurrency miner activities on the computer systems of targets in order to get Monero symbols at targets expenditure. The result of …

Read More »

XmrigDaemon.exe Miner Virus – How to Remove It

A brand-new, really unsafe cryptocurrency miner infection has been identified by safety researchers. The malware, called XmrigDaemon.exe can infect target sufferers making use of a range of ways. The main point behind the XmrigDaemon.exe miner is to employ cryptocurrency miner tasks on the computer systems of sufferers in order to obtain Monero tokens at sufferers expenditure. The outcome of this …

Read More »

Wincache.exe Miner Virus – How to Remove It

A new, very unsafe cryptocurrency miner infection has actually been spotted by safety scientists. The malware, called Wincache.exe can infect target sufferers utilizing a selection of methods. The essence behind the Wincache.exe miner is to employ cryptocurrency miner tasks on the computers of sufferers in order to acquire Monero symbols at victims cost. The result of this miner is the …

Read More »

Remove Ntdll.exe: complete and effective removal guide

A new, really harmful cryptocurrency miner virus has been identified by protection scientists. The malware, called Ntdll.exe can infect target sufferers utilizing a variety of methods. The main point behind the Ntdll.exe miner is to use cryptocurrency miner tasks on the computer systems of targets in order to get Monero tokens at targets expenditure. The outcome of this miner is …

Read More »

Virus Atnon.exe Trojan coming back

A brand-new, really harmful cryptocurrency miner virus has been found by safety and security scientists. The malware, called Atnon.exe can contaminate target victims using a range of methods. The main idea behind the Atnon.exe miner is to employ cryptocurrency miner activities on the computer systems of victims in order to obtain Monero symbols at sufferers cost. The outcome of this …

Read More »

Delete MSCLI.exe CPU Miner

A brand-new, really unsafe cryptocurrency miner infection has been spotted by security researchers. The malware, called MSCLI.exe can infect target sufferers using a selection of methods. The main idea behind the MSCLI.exe miner is to utilize cryptocurrency miner tasks on the computer systems of victims in order to acquire Monero symbols at victims expenditure. The outcome of this miner is …

Read More »

How to remove Hu.exe

A brand-new, extremely dangerous cryptocurrency miner infection has actually been identified by protection researchers. The malware, called Hu.exe can contaminate target victims making use of a range of methods. The essence behind the Hu.exe miner is to use cryptocurrency miner tasks on the computers of targets in order to obtain Monero tokens at victims expenditure. The result of this miner …

Read More »

Delete WMI Provider Host.exe CPU Miner

A new, extremely hazardous cryptocurrency miner infection has been detected by safety and security scientists. The malware, called WMI Provider Host.exe can contaminate target sufferers using a variety of means. The main point behind the WMI Provider Host.exe miner is to utilize cryptocurrency miner activities on the computers of targets in order to obtain Monero tokens at targets cost. The …

Read More »