Monthly Archives: August 2016 - Page 8

Proxy Gate

Proxy Gate

Proxy Gate is a potentially unwanted program that you might want to remove because it can subject you to commercial advertisements. According to Proxygate.net, Proxy Gate is service based on a large number of secured Socks5 proxies that are provided by volunteers, and it is claimed that these proxies can bypass limitations imposed on users by certain websites due to the location of their original IP address. Note that the version of this program featured on its website is entirely legitimate. However, it also comes bundled, and it is this version that we have classified as potentially unwanted. Read more »

ShinoLocker Ransomware

ShinoLocker Ransomware

An application known as ShinoLocker Ransomware has been introduced to the audience during a presentation at the Black Hat USA 2016 convention. This piece of software has been designed by a security researcher, pen-test tool developer and pentester Shota Shinogi mostly for further virtual security research and general education purposes. The tool can be obtained from its official website and is free of charge. It is fully customizable, and each user can build a unique version of ShinoLocker Ransomware. Even though it is a great tool to educate yourself and to have a deeper understanding of the inner structure and functionality of a basic ransomware application, our team advises to use it carefully especially if you are not and an advanced computer user since you might face some unwanted outcomes. In this report, we present the features of this malware simulator and present various ways that it could be used. Read more »

VenusLocker Ransomware

VenusLocker Ransomware

VenusLocker Ransomware is a serious new threat that can be a devastating hit to your computer and you too if it manages to infiltrate your operating system. According to our malware specialists at anti-spyware-101.com, this dangerous malware infection is based on the well-known EDA2 Ransomware, which is in fact an open-source ransomware. This means that it may be possible in the near future that a free file recovery tool will emerge on the net; however, as of yet we have not found any since this infection is fairly new. The main reason for this vicious attack is to force you to pay a certain ransom fee if you want to use your files ever again. But do you really think such crooks would actually send you a tool to decrypt your files and your private key just because they promised? What if they have to shut down their C&C server and your key gets lost? As you can see, there are a few things to consider before you rush to transfer the money. The bad news is that if you remove VenusLocker Ransomware, this will not recover your files; nevertheless, this is the right thing to do if you want to restore your computer. Read more »

Funtabstvsearch.com

Funtabstvsearch.com

Funtabstvsearch.com is a browser hijacker that affects the Chrome, Firefox, and Internet Explorer web browsers. This program modifies your default start page settings, and it forces you to go through several redirections before you can access the website you want. This type of intrusive behavior should not be tolerated. It is your job to remove Funtabstvsearch.com from your computer immediately. While you are at it, please scan your system with a licensed antispyware tool to locate other unfamiliar and potentially harmful programs. You know what they say: it never rains, but it pours; so you can expect quite a lot of ugly in your computer. Read more »

Uyari Ransomware

Uyari Ransomware

Uyari Ransomware is a malicious computer infection designed to steal your money. This program mostly affects computer users in Turkey, but it exhibits all the main aspects of a ransomware program, so it should be taken seriously.

One of the most important things about such infections is that they do encrypt your files, and they do ask for a ransom payment. Needless to say, you should never transfer the payment because that would be simply giving the criminals what they want. Instead, you need to remove Uyari Ransomware from the system as soon as possible and then figure out a way to restore your files. Read more »

CTB-Faker Ransomware

CTB-Faker Ransomware

The tests conducted in the Anti-Spyware-101.com internal lab have revealed that CTB-Faker Ransomware can take on the skin of other infamous ransomware infections. The most common version of this devious threat uses the name of the malicious CTB-Locker Ransomware, and it can introduce you to a pop-up window that clearly mimics the one used by CTB-Locker. It is most likely that the devious ransomware uses this trick to camouflage itself and make users research the wrong infection, which, ultimately, should stop them from removing it timely or taking necessary action. Hopefully, you will not be fooled and confused about this infection. One thing that should be said right away is that this ransomware does not encrypt files as stated via the misleading pop-up window. Unfortunately, that does not mean that your files are not at risk or that you do not need to delete CTB-Faker Ransomware. Continue reading. Read more »

Home.getpokedex.com

Home.getpokedex.com

As Pokémon Go is a very popular game these days, many users download third-party software that should help to play it. At first glance, the PokeDex Search extension promoting Home.getpokedex.com seems to be a useful piece of software, so there are some people who download the extension themselves and then notice the changes applied to their browsers. As you have probably understood, you will encounter Home.getpokedex.com. It will be set in the place of your homepage and the New Tab page, whereas your search engine will be changed to search.getpokedex.com. You will definitely see these changes if you use Google Chrome or Mozilla Firefox browsers. To be frank, the PokeDex Search extension is not as useful as it claims to be. In addition, it will not allow you to set another search engine, homepage, and the New Tab page you prefer unless you get rid of it fully. Researchers at anti-spyware-101.com suggest doing that as soon as possible not only because it is the only way to change the browsers’ settings, but also because there is a small possibility that Home.getpokedex.com will expose you to potential threats if you use its search box to find the information on the web. Read more »

SearchAssistant.co

SearchAssistant.co

You may be given the impression that SearchAssistant.co is a reliable, legitimate search engine that has a fun customizability feature, but the truth is that it is a browser hijacker, dedicated to hijacking your browser’s settings and replacing its search engine. You should remove it regardless of whether you installed in intentionally or not. Indeed, the primary reason it has been classified as a hijacker is that it can enter your computer without your knowledge or consent. Furthermore, it can feature promoted links in its search results, and they may not always be legitimate. Read more »

iStream.link

iStream.link

From iStream.link description on the Chrome Web Store, it seems that the tool is designed to provide results with streaming content. However, it is hard to say for what purpose the applications developers released it, especially when the provided official web page does not appear to be available anymore. Based on the software’s behavior our researchers classified it as a browser hijacker. The application might affect major browsers by replacing their default search engine or homepage with Stream.link. If you can, you should avoid this search engine because it might show modified results, which could include potentially harmful third-party content. Users who do not want to risk their computer’s safety for such a doubtful program should remove it at once. Deleting the browser hijacker is not that complicated, but if you are an inexperienced user, it might be easier to follow the instructions below. Read more »

MoviesTabSearch.com

MoviesTabSearch.com

MoviesTabSearch.com can appear in your Google Chrome browser after you click on a suspicious third-party advertisement and you install a software bundle. Based on its behavior our malware researchers have labeled this malware infection as a browser hijacker. This browser extension offers you a few quick links to online movie-related and social networking sites apart from the main feature that is an unreliable search engine. Leaving this infection in your browser would be a mistake since it can put your system security at risk with the content it may introduce you to; not to mention the possibility that other malware programs have also slipped onto your system along with this hijacker. Right now your computer could be quite vulnerable thanks to all these threats. This is why it is important that you remove MoviesTabSearch.com from your browser and all related and unrelated infections from your system as well if you want to use a safe computer. If you want to learn about the details, please continue reading. Read more »