Monthly Archives: January 2020 - Page 2

5ss5c Ransomware

5ss5c Ransomware

The hackers behind 5ss5c Ransomware seem to be greedy as they may ask their victims to pay 1 BTC in exchange for decryption tools. As you see, the malware’s victims might need such tools to decrypt files locked by the malicious application. The message, which explains how to get in touch with the hackers and what a user needs to to exactly, gets displayed right after the threat enciphers all targeted files. As usual, data that gets encrypted ought to be personal, while files that belong to the system should be left alone. Thus, it is safe to say that receiving this malicious application might cause you lots of damage if you have irreplaceable files on your device. However, we advise not to panic and to read the rest of our article to learn how it works and how to eliminate 5ss5c Ransomware. Read more »

Bitsran

Bitsran is a malicious infection that doesn’t work alone. We have to understand that such Trojans are often just malware components that tell us about an onset of a far more dangerous infection. As far as we know, this Trojan component is part of the Hermes Ransomware infection, and it might be the first step in this entire attack. It is essential to detect and remove Bitsran before it manages to launch the file-encrypting infection. Although it is possible to do that manually, we would strongly recommend using an automated antispyware tool that would help you terminate all the malware components automatically. Read more »

Dudell

Dudell is a malware component that allows cyber crooks to infect multiple systems all over the world. Whenever we deal with such infections, we have to understand that they often work in tandem with several other threats. Dudell is categorized as a Trojan infection, and so it means that users probably do not realize they have been infected with it until it is a bit too late to do anything about it.

Hence, prevention is extremely important when it comes to such infections. If you want to remove Dudell, you have to perform regular system scans with reliable antispyware tools, so that you would locate and terminate this infection immediately. Read more »

Anchor

While we usually talk about one specific infection, Anchor happens to be a group of Trojan infections that target multiple systems worldwide. There have been several waves of this infection recorded, and users are always encouraged to learn more about Trojan distribution, so that they could avoid similar intruders in the future.

What’s more, we would like to point out that removing Anchor manually could be quite challenging. Therefore, it would be recommended to invest in a licensed security application that would terminate everything related to Anchor at once. After all, automatic malware removal is the fastest and the most efficient option you have. Read more »

C0hen Locker Ransomware

C0hen Locker Ransomware

C0hen Locker Ransomware locks not your computer, but some of the files located on it. To be more precise, the malicious application encrypts files, and, as a result, they become unreadable as victims cannot open them. There is a way to restore such data, but it requires having a decryptor and a unique decryption key. Sadly, only the malware’s developers may have these means that could restore files, and they demand a ransom in exchange for them. The worst part is that even if you pay what they ask, you might still end up being scammed. Therefore, we do not recommend putting up with the hackers’ demands. Also, we advise deleting C0hen Locker Ransomware as quickly as you can because if it stays, it might relaunch after you restart your computer and encrypt files that you may yet create or obtain. To learn how to eliminate C0hen Locker Ransomware as well as other things about it, we invite you to read our full report. Read more »

MediaConverterOnline Promos

MediaConverterOnline Promos

You might think that MediaConverterOnline Promos has something to do with video or music conversion, but it is a potentially unwanted program that shows advertisements. Now, who would install a program that shows ads? Well, if it is advertised as a tool that can convert video/audio files, some people might be willing to take the ads, but some users might choose to install the extension simply because of the ads. Yes, there are people in this world who seek out ads, and it is most likely that they do that because they want to save money or find better deals. Whatever your reasoning might be, if you have decided to install the extension, you want to think very carefully if it is not better for you to remove it from your Google Chrome browser. If you have already decided to delete MediaConverterOnline Promos, the Anti-Spyware-101.com research team has created a guide that should assist you below. If you want to get more information about the suspicious PUP, you should continue reading. Read more »

Lampion

The end and the beginning of a year is always a good season for spammers and cyber crooks. There are so many ways to slither into target systems because of year-end communication between various companies and organizations. The people behind the Lampion Trojan infection seem to have caught up on that. This malicious infection targets users in Portugal by masquerading as an official email from the Portuguese Government Finance & Tax.

There are several stages of this infection, but the technical story aside, the most important thing for users is to remove Lampion and to avoid similar intruders again. Hence, we shall look at those two aspects in our description. Read more »

BIOLOAD

Can you name an infection that impersonates a legitimate Microsoft .DLL file to carry out malicious actions? BIOLOAD is an infection that is capable of doing just that. This malware sneakily plants its own binary along with an authentic binary, and then it uses it to drop malware. More specifically, we are talking about Carabank, a dangerous banking Trojan that has, in the past, cleaned out money from online banking systems and even ATMs. Undoubtedly, the sneaky infection we are talking about in this report was, most likely, created to target banks and very specific systems. Could regular Windows users be affected? Perhaps, the attackers employing it could change tactics. Ultimately, when it comes to malware and cybercriminals, unpredictability is the only predictable thing, and so we would not reject the possibility that pretty much anyone could face the threat. Obviously, regardless of whether you are a banked or a stay-at-home mom, you need to remove BIOLOAD. Continue reading for removal tips. Read more »

PhobosImposter Ransomware

PhobosImposter Ransomware

PhobosImposter Ransomware is a threat that adds the .phobos extension to each file that it enciphers. The malicious application uses a strong encryption algorithm, which is why files that get affected become unusable unless a victim has a decryption tool. Sadly, usually, decryption tools cannot be downloaded from the Internet. That is because hackers are often the only ones who have such tools, and they provide them only to those who pay a ransom. Cybercriminals behind PhobosImposter Ransomware are not an exception as they claim they want to receive a payment in Bitcoins in the malware’s displayed ransom note. Before deciding what to do, we encourage you to find out more about this malicious application, which you can do if you read the rest of our article. If you decide you wish to erase PhobosImposter Ransomware, we recommend checking our removal instructions that you can find at the end of the text. Read more »

Shitcoin Wallet

Shitcoin Wallet

If you want to be safe, Shitcoin Wallet is not the extension/program you should install. Anti-Spyware-101.com researchers warn that this PUP (potentially unwanted program) has the ability to inject malicious code and extract personal information from users visiting five cryptocurrency management platforms, which are binance.org, idex.market, myetherwallet.com, neotracker.io, and switcheo.exchange. If you visit any of these platforms while the PUP is active, your login credentials and crypto wallet information can be leaked without your permission, and, unfortunately, there is only one thing that can happen after that. Of course, the collected data could stay untouched, but it is possible that someone could use it to log into your wallets and tamper with the funds found within them. Do you want that? Of course, you do not, and that is why you should delete Shitcoin Wallet without further delay. If you want to waste no time, check out the last paragraph and the removal guide below. If you want to learn more, continue reading. Read more »