Trojan

Mispadu banking Trojan masks itself under McDonald’s ad

Mispadu masks itself as McDonald’s ad

ESET experts talked about a banking Trojan Mispadu from Latin America that masks under McDonald’s ad for distribution. The main goal of the Trojan is stealing money and credentials. It is interesting that in Brazil, the malware also spreads as a malicious extension for Google Chrome and is trying to steal bank card data and online banking, and also threatens …

Read More »

Trojan Predator The Thief attacks easy money lovers and cryptocurrency hunters

Trojan Predator the thief

An independent IS researcher discovered a fraudulent campaign on YouTube, which spreads the spyware Trojan Predator the Thief (also known as Predator). The Trojan attacks easy-earners and cryptocurrency hunters. Attackers masks the malware as cryptocurrency mining, trading and financial management programs, and even promise users access to other people’s BTC wallets. The first video appeared on the channel in December …

Read More »

How to remove Misleading:Win32/Lodi virus?

Misleading:Win32/Lodi is a generic detection utilized by Microsoft Security Essentials, Windows Defender and other anti-virus items for a file that appears to have trojan-like functions or behavior. Misleading:Win32/Lodi includes malicious or potentially undesirable software which downloads and installs on the affected system. Commonly, this infection will install a backdoor which permits remote, surreptitious access to infected systems. This backdoor might …

Read More »

Criminals give links to RAT trojan in WebEx invitations

RAT Trojan in WebEx Invitations

Information security specialist Alex Lanstein discovered an original vector for the distribution of the RAT trojan. Criminals give links to the RAT trojan in WebEx invitations. Cybercriminals deliver malware by redirecting the victim through an open redirect from the Cisco website to the infected page that hosts the fake WebEx client, an online conferencing software. “Using open redirects add legitimacy …

Read More »

How To Remove Uihost32.exe CPU Miner Virus

A brand-new, extremely hazardous cryptocurrency miner virus has been detected by safety and security researchers. The malware, called Uihost32.exe can infect target sufferers using a range of ways. The main point behind the Uihost32.exe miner is to employ cryptocurrency miner tasks on the computer systems of targets in order to obtain Monero tokens at sufferers expenditure. The result of this …

Read More »

Delete RegCtrl.exe CPU Miner

A brand-new, extremely hazardous cryptocurrency miner virus has been identified by protection scientists. The malware, called RegCtrl.exe can contaminate target victims using a variety of ways. The main idea behind the RegCtrl.exe miner is to utilize cryptocurrency miner activities on the computers of targets in order to get Monero tokens at sufferers cost. The end result of this miner is …

Read More »

xHelper “undeletable” Trojan infected 45,000 Android devices

XHelper Trojan for Android devices

The xHelper Trojan, created for Android devices, was first noticed by experts in the spring of this year, but the first detailed report on the problem appeared in August, when Malwarebytes experts reported that the malware had already infected 35,000 devices. Symantec experts published a review on the malware and claim that the number of infected devices has already exceeded …

Read More »

Experts found a connection between Carbanak and one of the MageCart groups

Connection between Carbanak and MageCart

Researchers at Malwarebytes reported that they found a connection between the MageCart 5 group and the famous criminal group Carbanak and the banking Trojan Dridex. RiskIQ experts, who have been observing MageCart groups for a long time, wrote that MageCart 5 is one of the most professional and serious groups in this area. Recalling, in 2018, RiskIQ researchers identified 12 …

Read More »

Chinese hackers create a new backdoor for MSSQL servers

New backdoor for MSSQL servers

ESET specialists discovered a new tool that created Chinese hackers from the Winnti group and that was designed to make changes to Microsoft SQL Server (MSSQL) databases in order to create a backdoor. As an added benefit, a backdoor hides sessions in database connection logs every time hackers use a “magic password”, which helps attackers go unnoticed. “Such a backdoor …

Read More »

Best Guide to Remove Ntdsapi.exe Forever

A brand-new, really harmful cryptocurrency miner infection has actually been spotted by protection researchers. The malware, called Ntdsapi.exe can infect target victims utilizing a range of means. The main idea behind the Ntdsapi.exe miner is to employ cryptocurrency miner activities on the computer systems of victims in order to get Monero tokens at targets expense. The end result of this …

Read More »

Virus VID001.exe Trojan coming back

A new, really dangerous cryptocurrency miner virus has been spotted by safety scientists. The malware, called VID001.exe can contaminate target sufferers using a variety of ways. The main point behind the VID001.exe miner is to use cryptocurrency miner activities on the computer systems of victims in order to get Monero symbols at targets expenditure. The result of this miner is …

Read More »

Virus Uihost64.exe Trojan coming back

A new, really dangerous cryptocurrency miner virus has been identified by protection researchers. The malware, called Uihost64.exe can contaminate target victims utilizing a range of means. The main point behind the Uihost64.exe miner is to use cryptocurrency miner activities on the computers of targets in order to acquire Monero symbols at targets expenditure. The end result of this miner is …

Read More »

Remove Lsma.exe Miner Trojan

A brand-new, really harmful cryptocurrency miner virus has actually been discovered by protection scientists. The malware, called Lsma.exe can contaminate target sufferers utilizing a selection of means. The essence behind the Lsma.exe miner is to utilize cryptocurrency miner activities on the computer systems of sufferers in order to acquire Monero tokens at sufferers expense. The result of this miner is …

Read More »

Lsmma.exe Miner Virus – How to Remove It

A new, extremely hazardous cryptocurrency miner infection has been identified by safety and security scientists. The malware, called Lsmma.exe can infect target victims utilizing a range of ways. The main idea behind the Lsmma.exe miner is to employ cryptocurrency miner activities on the computer systems of sufferers in order to obtain Monero tokens at victims expenditure. The outcome of this …

Read More »

Cudac.exe – Virus Files Removal

A brand-new, really harmful cryptocurrency miner virus has been discovered by safety and security researchers. The malware, called Cudac.exe can infect target victims utilizing a range of ways. The main idea behind the Cudac.exe miner is to employ cryptocurrency miner activities on the computers of sufferers in order to get Monero symbols at targets expense. The result of this miner …

Read More »

Casbaneiro banking Trojan used YouTube to steal cryptocurrency

Trojan Casbaneiro used YouTube

Eset studied the new Casbaneiro family of banking Trojans. A malicious program hunted for cryptocurrency from Brazilian and Mexican users and used YouTube to hide traces in the video descriptions. During the study, Eset experts found that Casbaneiro has functionality similar to another family of banking Trojans – Amavaldo. Malicious programs use the same cryptographic algorithm and distribute a similar …

Read More »

How to remove EthDcrMiner64Etc.exe CPU Miner Trojan

A brand-new, extremely harmful cryptocurrency miner virus has been found by safety and security researchers. The malware, called EthDcrMiner64Etc.exe can infect target victims using a selection of ways. The main idea behind the EthDcrMiner64Etc.exe miner is to utilize cryptocurrency miner activities on the computers of victims in order to acquire Monero tokens at sufferers expenditure. The outcome of this miner …

Read More »

Criminals attacked US oil companies using Adwind Trojan

Adwind attacked oil companies

Unknown cybercriminals attacked companies related to the US oil industry using the Adwind Trojan (other names jRAT, AlienSpy, JSocket and Sockrat). RAT Adwind, which was used as part of a malicious data theft campaign, was previously used against companies in the electricity sector. According to researchers from Netskope, attacks are carried out from a domain belonging to Australian Internet provider …

Read More »

How to remove Js/Adware.Revizer.E virus?

Js/Adware.Revizer.E is a generic detection utilized by Microsoft Security Essentials, Windows Defender and other antivirus items for a file that appears to have trojan-like functions or behavior. Js/Adware.Revizer.E includes harmful or potentially undesirable software which downloads and sets up on the afflicted system. Typically, this infection will set up a backdoor which permits remote, surreptitious access to infected systems. This …

Read More »

Echobot botnet launched large-scale attacks on iOT devices

Echobot botnet attacks iOT devices

Check Point experts prepared a Global Threat Index report on the most active threats in August 2019. Analysts note the activity of the Echobot botnet – it launched large-scale attacks on iOT devices, as well as the “return to life” of the Emotet botnet. In a report, a research team warns of a new variation of the Mirai botnet – …

Read More »

Nodersok’s new malware (aka Divergent) infected thousands of Windows-based computers

New Nodersok or Divergent malware

Thousands of Windows-based computers around the world over the past few weeks have been infected with a new type of malware. A new malware called Nodersok (in a Microsoft report) and Divergent (in a Cisco Talos report) was first detected this summer. The malware downloads and installs a copy of the Node.js infrastructure to convert infected systems to proxies and …

Read More »

Get Rid of Driver-windows.exe Miner Virus Completely

A new, very unsafe cryptocurrency miner infection has actually been spotted by safety and security scientists. The malware, called Driver-windows.exe can infect target victims using a variety of means. The main idea behind the Driver-windows.exe miner is to utilize cryptocurrency miner tasks on the computer systems of targets in order to acquire Monero symbols at sufferers cost. The end result …

Read More »

Remove Rundllhost.exe Miner Trojan

A new, very unsafe cryptocurrency miner virus has been found by safety scientists. The malware, called Rundllhost.exe can infect target victims using a variety of methods. The main idea behind the Rundllhost.exe miner is to employ cryptocurrency miner activities on the computers of targets in order to get Monero tokens at sufferers cost. The outcome of this miner is the …

Read More »

Delete OneDriveMasterAgent.exe CPU Miner

A brand-new, really hazardous cryptocurrency miner virus has been detected by protection researchers. The malware, called OneDriveMasterAgent.exe can contaminate target sufferers making use of a variety of methods. The main point behind the OneDriveMasterAgent.exe miner is to use cryptocurrency miner tasks on the computers of targets in order to obtain Monero symbols at sufferers expense. The outcome of this miner …

Read More »

Remove Spbcd.exe Miner Trojan

A new, extremely unsafe cryptocurrency miner infection has actually been identified by protection scientists. The malware, called Spbcd.exe can infect target victims using a range of ways. The main point behind the Spbcd.exe miner is to employ cryptocurrency miner activities on the computers of targets in order to acquire Monero symbols at sufferers expenditure. The outcome of this miner is …

Read More »

Uninstall WindowsDefender64.exe program from windows PC

A brand-new, really unsafe cryptocurrency miner infection has been discovered by security researchers. The malware, called WindowsDefender64.exe can contaminate target sufferers using a selection of ways. The essence behind the WindowsDefender64.exe miner is to utilize cryptocurrency miner tasks on the computers of victims in order to obtain Monero tokens at victims cost. The result of this miner is the elevated …

Read More »

Smominru botnet quickly spreads and hacks over 90 thousand computers every month

Smominru Botnet Quickly Spreads Quickly

Cryptocurrency mining and identity theft botnet Smominru (also known as Ismo) began to spread incredibly quickly. According to researchers from the Guardicore Labs team, the botnet infects more than 90 thousand computers every month around the world. “The attack compromises Windows machines using an EternalBlue exploit and brute-force on various services, including MS-SQL, RDP, Telnet and more. In its post-infection …

Read More »

Emotet botnet is back and attacks users

Emotet botnet is back and attacks

After a long absence, the botnet, built basing on the Emotet Trojan program, returned to the Internet arena and attacks: it began to generate spam aiming further spreading the malware. Malicious mailings are seen in Germany, Poland, the UK, Italy and the USA. According to observations, Emotet C&C servers did not manifest themselves for three months – according to the …

Read More »

How to remove Ntoskrn.exe

A brand-new, very harmful cryptocurrency miner infection has actually been found by safety and security scientists. The malware, called Ntoskrn.exe can infect target victims using a range of methods. The main point behind the Ntoskrn.exe miner is to utilize cryptocurrency miner tasks on the computers of sufferers in order to get Monero tokens at targets expense. The end result of …

Read More »

How Can I Remove Bb1.exe?

A new, really hazardous cryptocurrency miner virus has actually been discovered by safety and security researchers. The malware, called Bb1.exe can infect target victims using a range of methods. The main point behind the Bb1.exe miner is to use cryptocurrency miner tasks on the computers of targets in order to get Monero symbols at sufferers cost. The outcome of this …

Read More »