Monthly Archives: December 2019

Odveta Ransomware

Odveta Ransomware

Odveta Ransomware locks personal victims’ files and marks them with the .odveta extension. Such data can only be opened if it is decrypted first. Unfortunately, the malicious application’s developers do not provide decryption tools free of charge. In exchange, they should ask to receive a particular sum in Bitcoins. The malware’s ransom note does not say how much cybercriminals wish to get, but whatever the sum could be, we advise thinking carefully before deciding if you should pay it or not. There is always a risk that hackers may not hold on to their end of the deal. Before you choose anything, we advise getting to know this malware better by reading our full article. Also, if you decide you want to remove Odveta Ransomware manually, we recommend checking the deletion steps available below this text. Read more »

IconDown

IconDown falls under the classification of Trojans. Such malicious applications can enter a system without any permission and without being detected. Cybersecurity specialists suspect that this threat was created by a group of hackers known as BlackTech. Since these cybercriminals seem to be concentrated on cyber-espionage in Asia, it is likely that their newest threat might be used to attack systems of various institutions to obtain highly valuable information. If you want to learn more about it, we encourage you to read our full blog post. Also, users who are interested in learning how to erase IconDown manually should check the instructions we provide below this article. If you have any questions about the Trojan or its removal, feel free to leave us a message in the comments area. Read more »

Stream+

Stream+

Stream+ might be just the right tool for you if you want to see as much of sponsored advertisements in your search results as possible. The description of this browser extension says that it inserts sponsored content into Google search results that is different from the advertising material shown by Google. Users should know that this application falls under the classification of potentially unwanted programs, which means it might be a mistake to trust it or its sponsored material. Further, in this report, we explain more about this extension, like where might it come from and how it works. Thus, if you want to know more about it, we encourage you to read our full article. On the other hand, if you already placed this plugin on your browser, but now wish to remove Stream+, we invite you to use our instructions placed a bit below this article. Read more »

Afrodita Ransomware

Afrodita Ransomware

Afrodita Ransomware is a rather obscure ransomware infection that enters target computers to extort money from their victims. Getting infected by a ransomware can be a devastating experience because not all programs have public decryption tools. Therefore, the best remedy against a ransomware infection is a file back-up. You need to regularly make copies of your data and then back it on either on an external hard drive or a cloud drive.

As for Afrodita Ransomware, this program deletes itself once the file encryption is complete, but there are some leftover files you need to terminate. For that, please scroll to the bottom of this description for manual removal guidelines. Read more »

TurkStatik Ransomware

TurkStatik Ransomware

New file-encrypting threats keep emerging, and TurkStatik Ransomware is one of them. This infection was created with Turkish-speaking Windows users in mind because the message that the attackers introduce to their victims is in Turkish. Does that mean that the infection is likely to be spread via Turkish websites? That is a possibility, but it is most likely that it would be sent via email or by exploiting the existing system or software vulnerabilities. Without a doubt, whenever you are warned that the email you received is spam, you want to be very careful with it. If you can immediately tell that it was sent to you by someone you do not know, you should remove this message without hesitation. However, note that cybercriminals might hijack legitimate accounts to spread malware too. You also want to install all updates in time. Hopefully, you can still protect yourself against the dangerous infection, but if you need to delete TurkStatik Ransomware from your operating system, you should not hesitate to do it as soon as possible. The most important thing is that you do not pay attention to the attackers’ demands. Read more »

SaveTheQueen Ransomware

SaveTheQueen Ransomware is a recently created file-encrypting threat. It is possible that we encountered a test version, which means the malware could still be in development. Our researchers think so because the malicious application does not drop a ransom note. Showing a ransom note is typical behavior for ransomware as such programs are mostly used to extort money from regular home users, businesses, or institutions. Further, we explain how our encountered variant works, how it could be distributed, and how it could be erased if it enters a system. At the end of this text, we also provide deletion steps that show how to remove SaveTheQueen Ransomware manually, although we cannot guarantee the instructions will still work if hackers release a new version of the malware. Read more »

WatchBog Exploits Linux Servers

WatchBog is a malicious Trojan that attacks Linux servers. Therefore, it doesn’t seem to bother most of the regular computer users who are bound to be using either Windows or Mac OS machines. Nevertheless, we would like to tell you more about WatchBog, and what it is capable of. This entry will not deal with the Trojan removal because of the way it works. Please use this description to learn more about types of malware and what they do to various computer systems. Also, we always recommend exercising caution when you encounter unfamiliar content online. It is good to remember that malware infection could be just one click away. Read more »

DeathRansom Ransomware

DeathRansom Ransomware

The invasion of DeathRansom Ransomware might lead to the pseudo death of your personal files. This threat is capable of employing a unique algorithm to encrypt personal files, after which they are no longer readable. Although the creator of the infection does not seem to care about the files that are encrypted – in a sense that they do not read them or try to leak them online – they take the files hostage. After encryption, demands for a ransom payment are introduced to the victims, and it is claimed that victims can recover their files only if the ransom is paid. Unfortunately, there is no proof that files would be decrypted if the ransom was paid, and so Anti-Spyware-101.com researchers do not advise paying the ransom. If you did the opposite, it is likely that your files would go to waste. If you are ready to delete DeathRansom Ransomware from your operating system, check out the last section of the report that discusses the removal of this threat. If you want to learn more, continue reading. Read more »

CStealer Threatens the Security of Google Chrome Users by Stealing Passwords

Do you use Google Chrome on a daily basis? Perhaps you use it at work, or maybe you only use it at home. Whatever the case is, we are sure that you want to be safe while using this web browser. Unsurprisingly, Google Chrome is the most popular browser, with more than 69% of people using it all around the world. Unfortunately, the most popular services are usually the ones that are targeted by schemers and cybercriminals in most cases too. CStealer is a dangerous Trojan that was created to go after Google Chrome users specifically, and if it is successful, it can steal sensitive passwords stored on this browser. Read more »

ABCD Ransomware

ABCD Ransomware

ABCD Ransomware is a textbook file-encryptor, and so the name suits it very well. It is very predictable indeed, but that does not make this malware any less dangerous. If it slithers in successfully, and if there is no security software to catch and delete it in time, your personal files can be locked up for good. Also known as LockBit Ransomware, this malware does not have a free decryptor. In some cases, such tools are created by malware experts, but creating a working decryptor is not an easy task, and that is why we do not have free decryptors for most infections. Unfortunately, due to his, the victims of this malware might feel trapped, and if they feel trapped, they might be pushed into following the attackers’ demands. Victims are promised “decryptor software” if they do as told, but trusting cybercriminals and their promises is always risky, and we cannot guarantee that you will be given what you need. To add insult to injury, the files are not automatically restored when you remove ABCD Ransomware. Read more »