Author Archives: Lisa Blanc - Page 172

Locky Strikes an Unlucky Hospital

A Methodist hospital in Kentucky was hit hard earlier this week when a vicious Trojan ransomware attacked their computer network. Once this malware infection infiltrated one of the computers, it quickly spread on the whole network infecting all local drives as well as unmapped network shares. Locky Ransomware, as it was named after the .locky extension it appends to files, encrypted all databases, image, video, audio, and program files with a next-to-impossible-to-crack encryption algorithm. Obviously, the hospital will not be able to use the infected computers and the encrypted files unless they comply with the demands of the cyber criminals who created this dangerous Trojan. Although the ransom fee does not seem to be too high for an institution, this hospital is working closely with the FBI to find a legal way out of this terrible situation. Nevertheless, they have not yet ruled out the possibility of paying the fee to be able to recover the files. One thing is certain, though, they will not be able to use the infected computers unless they remove Locky Ransomware. Read more »

Rokku Ransomware

Rokku Ransomware

Once Rokku Ransomware settles in, it locks various types of files on user’s computer with a strong cryptosystem called RSA-3072. It means that without a unique decryption key it would be impossible to regain your files. If you want to obtain a unique key for decryption, you will have to pay a particular price in digital currency called bitcoins. It seems that you have two options: either pay the ransom and get your files back or erase Rokku Ransomware from your computer and lose your data. If you back up your files occasionally then there is nothing to worry about. You could delete this malware either automatically with the legitimate security tool or manually with the instructions provided at the end of the article. Read more »

Maktub Ransomware

Maktub Ransomware

Maktub Locker is a malicious program that encrypts your files and forces you to pay a ransom. Although it promises that you will receive your decryption key after paying a certain amount of bitcoins, there are no guarantees that you will get it for sure. Do not start panicking as there are a few ways you can get rid of this malware. However, without the decryption key, the files on your computer will be lost, since it is impossible to decrypt them on your own. Under these circumstances, you should think about all the important files on your computer, and if you have made some copies, then you can delete Maktub Locker with no worries. You could use the removal instructions provided below, but when it comes to such serious infections like this ransomware, it is always better to leave this job for reliable security tools. Read more »

Redshitline Ransomware

Redshitline Ransomware

Redshitline Ransomware, which is also known as redshitline@india.com ransomware, is a computer infection which might become your worst nightmare. In most cases, it sneaks onto computers without permission and immediately starts acting in an undesirable way. The first thing users notice if Redshitline Ransomware manages to sneak onto the computer is the encrypted files. It will affect all of them, including documents, pictures, videos, and music for one reason – to obtain money from gullible computer users. If Redshitline Ransomware has found a security loophole on your computer too and entered your system, the only thing that you can do is to remove this infection from the system. You will not allow this infection to encrypt new files, if you get rid of it. Unfortunately, its deletion will not decrypt files that have already been encrypted. Read more »

Search Manager

Search Manager

It is possible that you find Search Manager in your Google Chrome browser when you open a new tab page and you do not know how this browser extension has got there. It is possible when this tool enters your computer in questionable ways. Unfortunately, our malware researchers at anti-spyware-101.com have found that it uses aggressive techniques to infiltrate operating systems; therefore, it has been categorized as a potentially unwanted program, i.e., a PUP. Most likely this is not the biggest nightmare that can hit your computer, but we still would like you to know more about this questionable tool and what kinds of potential risks surround it. Hopefully, by the end of this article you will be able to decide how to act and what to do. We certainly think that you should remove Search Manager if you consider yourself a security-minded computer user. Please carry on reading our report to learn more. Read more »

WowMovix

WowMovix

Even though WowMovix is available on the Chrome Web Store, it does not mean that the program should be trusted, and you should always do your own research before installing any software. Speaking about this particular application, you should be aware that it is a browser extension working only on Google Chrome. Also, it is categorized as adware because it shows various ads while searching the Internet. These ads are provided by a third party, so you could be redirected to their websites, and some of the sites might be untrustworthy or potentially dangerous to your system. However, you can delete the extension at any time and avoid such possible threats. The removal is not complicated, but it could be difficult for inexperienced users, so we will provide you with the instructions below the text. Read more »

Utilitab Secure

Utilitab Secure

Whether you have downloaded Utilitab Secure from utilitab.com or the Chrome web store at chrome.google.com/webstore/category/apps, you are dealing with the same potentially unwanted program that pretends to be a beneficial tool. Although this program is somewhat capable of performing the way it is supposed to, it is not the security tool you might be after. We are sure that this program is installed by those who are convinced that it will help browse more safely. Although this program offers a tool to screen URLs, this is as far as it will go with the protection of your virtual security. Do you still think that this program is beneficial? Anti-Spyware-101.com analysts believe that this PUP (short for “potentially unwanted program”) was created for other reasons than to protect you. If you are curious about this, and you want to learn how to delete Utilitab Secure, this is the report you need to read. Read more »

Search.searchcoun.com

Search.searchcoun.com

Search.searchcoun.com is a questionable search page that may appear in your browsers when a browser hijacker lands on your computer. It is also possible that this happens without your permission, which is a clear example of a privacy breach. However, when it comes to browser hijackers, according to our malware specialists at anti-spyware-101.com, most of the time it is the unsuspecting computer user who actually lets them on board. It is possible that you are installing a freeware bundle and you are offered checkboxes to untick if you do not want certain changes to your browsers, such as setting a new home page and new tab page. It is easy to overlook this step and that is how people usually infect their computers with browser hijackers among other malware threats. You need to know that you cannot trust this search page or any of its content. This hijacker may expose you to potentially unsafe websites and third-party ads. Read more »

Search.easyinterestsaccess.com

Search.easyinterestsaccess.com

Make sure not to take any chances with a program called Search.easyinterestsaccess.com because it is yet another intrusive browser hijacker. What is unfortunate is the fact that a rather large number of Internet users already have this invasive piece of software fully operating on their computer. If you happen to be one of those unlucky users, do not hesitate and conduct its complete removal without any second thoughts. The browser hijacker in question is only capable of altering your online experience for the worse by making a few essential changes to your web browser. While such functionality of this intrusive program is the most prominent one, you must also be aware of the fact that in some cases it has been noticed that it could also operate in a potentially harmful way; the hijacker could turn out to be the reason your operating system might get infected with other suspicious and sometimes even malicious applications. Read more »

Screen Addict

Screen Addict

Screen Addict is not a program that you should trust entirely. This is so because this tool has been dubbed as a potentially unwanted program by malware researchers working at our internal labs. Such classification was made mostly because it works in a questionable way. Unfortunately, vendors of this application vaguely inform you about the fact that this dubious program will be able to change your web browser’s default settings once it gains access to your operating system. Mostly this questionable piece of software is promoted as a tool that you should use in order to obtain access to various movies right within your web browser. It might seem like a useful tool to run on your operating system at first; however there are a few dubious features of this program that might alter your web browsing for the worse. This is so because it can make changes to your web browser’s default settings with virtually no notification. Such dubious way of operating is the main reason our team of malware experts at Anti-Spyware-101.com highly advise you to use the detailed removal instructions below to terminate Screen Addict in its entirety. Read more »