Monthly Archives: October 2017 - Page 3

Thtlocker Ransomware

Thtlocker Ransomware

Thtlocker, also spelt THT Locker, is a piece of ransomware that temporarily locks the screen of the PC. The Thtlocker ransomware is not as dangerous as the notorious ransomware infections such as CryptoLocker or WannaCry. The analysis of the Thtlocker threat has shown that the infection is poorly coded in .NET, which is a framework for building different types of software on the Windows operating systems. The Thtlocker Ransomware can be removed manually, but it is highly advisable to implement anti-malware software in order to prevent further malware attacks, which are likely to take place if you keep the OS unprotected. Read more »

Rotor Ransomware

Rotor Ransomware may not leave any ransom note on the infected computer, but we have no doubt it is a malicious file-encrypting application designed to take the victim’s files as hostages and extort money from the user. Our researchers at Anti-spyware-101.com say that while the malware does not drop any ransom note, it might mark all encrypted data with a particular extension which should state a specific email address. Probably, the threat’s creators expect users to contact them via such email. However, we do not recommend doing so as there are no guarantees you will get your data back even if you pay what the cyber criminals ask. What we are trying to say is that dealing with such people could result in you losing your savings. Users who would not want to risk it should delete Rotor Ransomware instead, and once it is gone, it should be safe to restore the files from backup. To guide users through the removal process, we will add instructions at the end of the article. Read more »

BlueEagle Ransomware

BlueEagle Ransomware

If your files ever get a new extension .SaherBlueEagleRansomware appended to them, this must be one of the first signs that BlueEagle Ransomware has successfully slithered onto the computer. It might be still in the development phase, but we cannot tell you that it is impossible to encounter it because cyber criminals might already actively distribute it. They have developed this malicious application having the only goal – to extract money from users. All cyber criminals know how hard it is to make users send money to them willingly, so they have programmed this ransomware infection to encrypt their files. If it ever shows up on your computer illegally, this will inevitably result in the loss of personal files. You will be asked to send money to cyber criminals in exchange for the special tool that can unlock your files, but, of course, you should not do that because you might be left without anything. To put it differently, you might still not be able to unlock your encrypted files, and cyber criminals will not return your money. We have only one piece of advice for those users who encounter malicious software trying to obtain money from them – remove the infection you have on your PC right away. In other words, you should not think about how to decrypt your files now. Instead, focus on the BlueEagle Ransomware removal. Read more »

Search.searchwamtv.com

Search.searchwamtv.com

Why have you allowed Search.searchwamtv.com to replace your normal homepage? Have you done that hoping that you would be able to stream TV directly from your browser? If this is what you believed in, you probably have acquired the browser hijacker along with Watch More TV Now, an add-on that was created for one purpose only: To spread the hijacker. At this moment, an official installer does not exist, which is why it is hard to say how exactly it is introduced to users, but, most likely, it is offered as a tool that can help watch TV easier. So, does this program work? The only thing it can do is provide you with easy-access links to netflix.com, hulu.com, and espn.com. While these sources are original and reliable, the hijacker itself should not be identified as beneficial. If you want to, you can easily add links to these and many other streaming services to your bookmarks bar. So, if the hijacker is useless, why was it created? Unfortunately, it appears that it might have been created for the purpose of advertising third-party content, and that might be a reason to delete Search.searchwamtv.com. Read more »

The Magic Ransomware

The Magic Ransomware

There is a reason why your files have a new .locked extension. The chances are high that a malicious application called The Magic Ransomware has slithered onto your computer successfully if original extensions of your personal files are gone. It does not differ at all from other ransomware infections – it encrypts users’ pictures, documents, videos, and music in order to obtain money from them. Users living in Italy should be the most careful, our security specialists say, because the ransom note this infection drops after the encryption of files is almost all in Italian, which suggests that this ransomware infection targets Italian-speaking users primarily. We are sure your files are locked too if this nasty infection has shown up on your PC illegally. Luckily, it is not that hard to remove it, so, please, go to erase it from your system as soon as possible. Unfortunately, we cannot say the same about the decryption of files. To be frank, we cannot even promise that you could unlock them without the decryption key cyber criminals have. Of course, we do not try to say here that you should go to purchase it from them because nobody knows if they are willing to give it to you. Consequently, you should focus on the removal of The Magic Ransomware mainly. Read more »

Critical Security Warning! Scam

Critical Security Warning! Scam is a fake tech support scam hosted on a website that can be shown to you at random while you browse the web. It was designed for Mac computers specifically, and our researchers say that a potentially unwanted application on your computer can open it. The scam claims that your Mac is under attack by hackers and wants you to call a featured fake tech support phone number. To get rid of this scam, you have to remove the software that loads its page. In this article, you will find out everything you need to know about Critical Security Warning! Scam and how you can get rid of it for good. Read more »

Tweakerbit Antimalware

Tweakerbit Antimalware

Tweakerbit Antimalware was categorized as a potentially unwanted program (PUP) because of its rather suspicious behavior. Our researchers at Anti-spyware-101.com tested the application by performing a system scan with it, during which they revealed the tool might identify harmless data belonging to legitimate software as malicious. One can only wonder what would happen after clicking the removal button as it is entirely possible Tweakerbit Antimalware could erase the harmless files it identified as suspicious. Still, we cannot be sure since we only got to test the free version of the PUP that does not allow to remove threats and asks to register for a full version. However, we do not advise purchasing it or even getting it for free when there are no guarantees you will have any use for it. In fact, our specialists recommend not to waste your time with this PUP and eliminate it with the instructions available below or a more reliable antimalware tool. Users who want more details about the program are welcome to read the rest of our article too. Read more »

search.yofitofix.com

search.yofitofix.com is a browser hijacker that usually affects MAC computers. It is has been programmed to apply changes to all popular web browsers, including Mozilla Firefox, Google Chrome, and Safari, so once you get infected with this browser hijacker, you will notice the changes applied to your default browser right away. Specifically speaking, you will find your homepage and default search tool changed without your knowledge. Because of this, you will see search.yofitofix.com open for you automatically when you launch your web browser. This page looks like a legitimate search tool, but it is not one of those legitimate search engines for sure, so we cannot tell you that it is safe to use it to perform web searches no matter that it looks fully reliable. In the worst-case scenario, the use of this search provider might result in the successful entrance of undesirable software. Of course, we do not try to say here that there is nothing you can do to protect your PC – it will be enough to stop using search.yofitofix.com as your default search tool. Read more »

Browzeable.com

Browzeable.com

Browzeable.com is a search engine which visually does not differ from other search engines. It does not have any strange looking toolbars and links to unknown websites. However, Browzeable.com  is considered a browser hijacker because it replaces the home page of Internet browsers without user's permission. Browser hijacking is likely to take place if you keep your operating system unprotected against malware, so, if you want to surf the Net safely, consider securing your OS. Browzeable.com  should be removed from the browser once spotted, and it is easy to notice it because the search engine is not active at the moment. The odds are that the search engine will be activated in the future, which is a just a matter of time.

Browzeable.com is owned by Polarity Technologies Ltd, based in Cyprus. We have already reviewed quite a few search engines developed by this company. There are many other search engines owned by Polarity Ltd, which has bombarded computer users with multiple undesirable browser hijackers. Read more »

Sensearch

Sensearch

If you think that Sensearch is a useful, lightweight browser extension that will let you access your favorite websites easily — think again because this extension does not do that. What it can do, however, is present you with commercial ads in the form of pop-ups, and also collects information about you to customize them. It can also enter your browser’s window in full screen. Therefore, you ought to remove it from your PC as soon as the opportunity arises because the ads it might show you can be misleading and even dangerous to your computer. Our cyber security experts have classified this extension as a potentially unwanted program because of the questionable and useless features it offers. Please continue reading if you want to find out more. Read more »