Category Archives: Worms
Retadup
There are infections that do malicious things, and then there are infections that drop other threats. Retadup belongs to the latter group, and while it can be used to intrude on the lives of Windows users, its main task is to execute other infections. To be more specific, the infection was found executing, a Monero miner, STOP Ransomware, and the Arkei password stealer. A miner is the kind of software that computes complex problems that are required for managing crypto-currency. In return, the owner of the miner is awarded money. Miners can exploit CPU resources and cause crashes or larger electricity bills. ...
Worm.Bondat
Worm.Bondat is a reproducing infection which is known to reach target computers through such external storage devices as USB flash drives. It is important that you remove this worm from your computer as soon as possible, because the longer you delay, the higher is the possibility that it will download additional malicious content onto your machine, and thus allow hackers to take full control of your system. Worm.Bondat is extremely dangerous so do not waste time and find the most effective weapon to delete this threat from your computer. ...
TR/ATRAPS.Gen2
TR/ATRAPS.Gen2 is a dangerous computer infection which is detected by AntiVir. It turns out that the anti-spyware tool is not capable of terminating TR/ATRAPS.Gen2 and keeps displaying a security alert that reminds the user about the threat. If you do not know how to get rid of annoying warnings and remove TR/ATRAPS.Gen2 from the computer, ...
Worm.Zhelatin.GG
Computer malware usually come with features that could be attributed to different categories of computer infections. For example, Worm.Zhelatin.GG is an e-mail worm that has rootkit features. This worm can spread on its own via spam e-mail attachments. In order to spread to other systems, Worm.Zhelatin.GG makes use of the e-mailing networks that belong to the compromised computer. ...
Worm.Antimane.A
Worms are computer infections that can easily replicate and spread on their own accord. A worm called Worm.Antimane.A may enter your computer from a number of different ways – it could travel via spam email attachments or social engineering scams that manifest themselves in a form of IM messaging. ...
Win32.Tepfer
Win32.Tepfer is the latest computer threat which spreads via spam emails which are supposed to attract unsuspecting users’ attention. Why should someone open the email? Cyber criminals have decided to employ the latest hot news about the explosions in Boston and created different emails containing various subjects related to the issue. ...
Worm.Win32.Vobfus
The name of Worm.Win32.Vobfus represents a family of self-replicating worms which may exist in your operating Windows system without your knowledge. In fact, it may run on your PC right now, even if you do not notice any disturbing symptoms and malfunctions. The devious infection should be removed from the computer as soon as you suspect it running. ...
Worm.Slenping.AE
Worm.Slenping.AE, also known as IM-Worm.Win32.Yahos and Troj_Jorik.AA, is a deceitful Windows systems attacking infection that can slither into your computer using instant messaging accounts. It has been researched that the worm attacks unprotected systems using such popular systems as Skype, Google Talk and Xfire. ...
Conficker B
Conficker.B is a variation of Conficker computer worm that is infected computers all around the world that run on Windows operating system. It was first detected in November 2008. It exploits various vulnerabilities in the Windows software to root in the computer. Consequently, as it infects a lot of computers Conficker.B creates a botnet that is a network of infected computers that are connected among each other and are controlled by another remote computer, possibly commanded by a hacker. ...
Conficker.C
It would seem as though Conficker C is the new version of the much despised and notorious Conficker worm, or as it is best known the Conficker B++ worm. This malicious and dangerous worm is rated as a severe threat which can cause permanent damage to an infected PC. Conficker C easily gains access to the intended victim’s PC by disabling any installed security software or applications. This makes it that much more difficult to detect and effectively destroy Conficker C from the system. ...