EntertainmentNewsNow Toolbar
EntertainmentNewsNow Toolbar is advertised as a tool for users who want to “Stay on top of the latest entertainment news!” However, if you imagine the toolbar will show you entertainment news once you open your browser, you might be disappointed as it is not how the application works. The extension provides a toolbar with links to various websites that can present celebrity news, scandals, and so on. Thus, to reach the wanted news, you would have to visit the toolbar’s suggested websites. Needless to say, you could do the same without installing the add-on in question. ...
Leto Ransomware
Leto Ransomware is a malicious application that can connect to the Internet without any permission, encrypt your personal files, and autostart with Windows to complete the previous two tasks once again. Hackers behind such threats usually have one goal, which is to make their users pay them money. This is why such infections not only encrypt files but also display messages demanding to pay a ransom in exchange for decryption tools. We have to warn you that no matter what the cybercriminals promise, there are no guarantees they will hold on to their end of the bargain. ...
Skipper
If you work for a government institution, you need to look out for Skipper. This malware was actively attacking operating systems in 2016, but the cybercriminals behind it could always resume attacks without any warning. These cybercriminals belong to the Turla APT group, and so they are completely unpredictable. This group employs various hacking tools – sometimes, several at the same time – to invade the targeted operating system and perform various malicious actions. It is hard to say what exactly the attackers would do using the backdoor Trojan for, but they definitely could personalize their attacks and do as little as record information about the infected system or as much as leak confidential information to the enemies of a targeted government. ...
Sherminator Ransomware
Trust us when we say, you would never want to encounter Sherminator Ransomware on your computer. However, if you are reading this description, you probably already have this dangerous infection on-board. Tough luck, the program has encrypted your files, and now you are looking for a way to get rid of Sherminator Ransomware. It is possible to remove this infection from your system, but it could prove to be challenging to get your files back. Please do not feel discouraged if you do not have a file backup. You should explore other file recovery options, and the best way to do that is address a local technician. ...
Domn Ransomware
Domn Ransomware seems to be a newly created threat as it still does not work as it is supposed to. The sample tested by our specialists only encrypted files but did not display a note demanding to pay for decryption. Such behavior is unusual for a ransomware application since most of them are created for money extortion. In any case, a missing ransom note means it might be impossible to contact hackers behind the malware and pay a ransom in the hope of receiving decryption tools. To tell you the truth, it is not something we would advise you to do even if you could, because there is always a risk you could get scammed. ...
WatchBog Attacks Linux Systems and Threatens Windows Systems Too
Vulnerabilities within your operating system can help WatchBog and thousands of other malicious infections to slither in. According to recent statistics, new malware is released every 7 seconds, and more and more infections emerge every single year. At the same time, more and more security tools and measures become available to users, and that means that cybercriminals have to be smart and come up with new ways to attack operating systems. Now, we start seeing malware that might cross over from one operating system to the next. ...
FTCODE Ransomware
FTCODE Ransomware encrypts pictures and various types of documents. During this process, the malware should mark each affected file with the .FTCODE extension, for example, ticket.pdf.FTCODE. Usually, most ransomware applications display a ransom note after the encryption process is complete, but not in this case. According to our specialists, the sample they were able to test did not create any message that would contain instructions on how to receive a decryptor or contact the threat’s developers. If you want to learn more about this malicious application, we invite you to read our full report. ...
Varenyky
Varenyky is a Trojan, and it uses misleading spam emails to slither in. How does that work? First, the attackers have to come up with a convincing message and a subject line to match it. For example, the subject line can tell you that your order is on its way. Once you open the email, the message inside might inform you that you need to confirm a delivery date or time. This is meant to lead you to an attached document file. If you are pushed into opening it, you are asked to enable macros, and once you do that, the Trojan is let into the operating system silently. ...
Retadup
There are infections that do malicious things, and then there are infections that drop other threats. Retadup belongs to the latter group, and while it can be used to intrude on the lives of Windows users, its main task is to execute other infections. To be more specific, the infection was found executing, a Monero miner, STOP Ransomware, and the Arkei password stealer. A miner is the kind of software that computes complex problems that are required for managing crypto-currency. In return, the owner of the miner is awarded money. Miners can exploit CPU resources and cause crashes or larger electricity bills. ...
TFlower Ransomware
TFlower Ransomware encrypts files and leaves a message described as an “IMPORTANT NOTICE THAT IS URGENT AND TRUE.” While we can agree that the note's statements that say a user cannot decrypt his files on his own are true, we do not believe there are any guarantees you will receive the offered decryptor. We always advise against trusting malware’s creators because they may promise to help but may not bother to do so once they get paid. In other words, putting up with their demands could end up hazardously, and you might lose not just your files, but also the money paid for the decryptor. ...