A new crypto-malware was detected. Specialists from the cybersecurity department gave it a name Hsdfsdcrypt Ransomware. Since its primary language is German, they suspect that it mainly targets German-speaking users. Of course, we cannot guarantee that users who do not speak this language are safe because this ransomware infection is spread via spam emails and can reach users regardless the language they speak or the country they live in. Without a doubt, Hsdfsdcrypt Ransomware is one of those infections that have been designed to lock users’ files, so the entrance of this malicious application is never pleasant. There is a bunch of ransomware infections that can make it impossible to access pictures, documents, music, videos, and other personal files; however, you can be sure that Hsdfsdcrypt Ransomware is the one that has infiltrated your computer if you can find a new file Wo_sind_meine_Dateien.html in every location containing files you can no longer open. In such a case, you need to remove the ransomware infection from your computer right away. It is not one of those sophisticated threats, so its removal will consist of only two steps: 1) killing the malicious process and 2) the removal of all suspicious files downloaded recently. Of course, before you take action, you should first read this article. Read more »
Author Archives: Lisa Blanc - Page 69
Relock Ransomware
Relock Ransomware can infiltrate your system behind your back and encrypt your personal files so that it can extort money from you for the unique decryption key that is need for you to be able recover your files. This malicious program is coded in C++ and has lots of similarities with Matrix9643@yahoo.com Ransomware. In fact, our malware specialists at anti-spyware-101.com say that this new ransomware malware infection could be a new variant of this previously mentioned ransomware. In any case, if this dangerous threat encrypts your files, there seems to be no way out. Even paying the ransom fee should be considered risky and you also need to understand that only in a few cases it actually happens that cyber criminals decrypt the victims' files or send the key to them. Please also keep in mind that paying any amount of money to such villains is as good as supporting them to commit further online crimes. All in all, we recommend that you remove Relock Ransomware from your computer immediately. Please read on to learn more about this vicious attack and how you can avoid similar ones in the future. Read more »
Soft Cores
Soft Cores is considered a Trojan by our researchers, so if you ever detect it on your computer, you should delete it right away. To be frank, it takes time for users to realize that this malicious application is installed on their computers because it seems that it tries to stay unnoticed. It not only enters computers illegally, but also performs activities in the background and does not have an interface. Of course, there are several symptoms showing that Soft Cores has been installed on the system successfully. First, you will find a new folder created in %APPDATA%. Second, a new Value will be created in the Run registry key. Third, the chances are high that your computer will start working quite sluggishly once this Trojan infection infiltrates your computer. If you have proof that it is responsible for the decrease in your computer’s speed, go to remove Soft Cores from your system as soon as possible. It is not one of those programs that act in a useful way. It is more likely that it will bring problems to you instead. We cannot promise that you could easily erase this Trojan infection from your computer because it does not have an uninstall entry in Control Panel, but we are sure you will manage to disable it one way or another. Read the rest of the article to find out how you can do that. Read more »
Curumim Ransomware
More and more new ransomware threats emerge, and Curumim Ransomware is the latest one to join the group. It appears that this threat is specifically targeted at those users who speak Portuguese, which is why it is most likely to be found on computers that are located in Portugal and Brazil. The purpose of this threat is to corrupt files, and that is done using an algorithm that is acquired once the infection is executed. The encryption key is most likely to be downloaded from a remote server, and a decryption key created during the process is then likely to be sent back so that you could not get your hands on it. Unfortunately, expert malware researchers and even decryption software cannot help the victims of ransomware threats in most cases, which means that once files are encrypted, they are encrypted for good. While we focus on this in the report, our main attention is towards deleting Curumim Ransomware. Without a doubt, the sooner you remove this threat from your system, the better. Read more »
PdfBaron
PdfBaron is a suspicious Google Chrome extension that provides both a search engine and a feature allowing to convert PDF and Microsoft Word documents. If you are considering getting it for yourself, it would be smart to read our report first and get to know it better before making such a decision. First of all, users should be aware the extension falls under the category of potentially unwanted programs. It signals the tool might not be worthy of your trust and it could have undesirable qualities. We will explain this in more detail later in the text, but if you already downloaded PdfBaron and already regret it, we can help you delete this suspicious application if you just slide slightly below the text and use the provided instructions. Read more »
Wallet Protector Extension
Wallet Protector Extension is an unreliable browser extension that may introduce users to untrustworthy third-party advertising content. At the moment of writing it can work only on Mozilla Firefox; therefore, it should not be encountered by users who browse with different applications. Plus, it looks like the program and its descriptions are available only in German, so there is even less chance to come across it. Nonetheless, if you installed Wallet Protector Extension, we encourage you to review our report and get to know it better, especially if you have doubts whether it would be good or not to leave the application installed. Further, in the article, we will explain why our researchers at Anti-spyware-101.com do not advise it, and if you decide to follow this advice, we can also offer the removal instructions available at the end of the article. Read more »
Zip Ransomware
Malicious applications are developed every day by cyber criminals. Zip Ransomware is one of the newest threats they have released. Specialists working at anti-spyware-101.com have detected it only recently, so it is not one of those prevalent infections yet. Of course, it does not mean that it cannot become one in the future and infiltrate your computer. Most likely, this has already happened if you are reading this article or you are a very curious computer user. If it is the first reason you have started reading this report, you must erase this ransomware infection from your computer immediately so that it could not cause more problems to you. We do not think that the Zip Ransomware removal will be very complicated because it does not drop any files on victims’ computers, it does not make copies of itself in several different directories, and it does not create any new registry keys in the system registry. Even though you should not find the ransomware removal procedure very complicated, we recommend reading this article from beginning to end first. You will find out how you can remove it and, additionally, you will be explained in detail how it acts on victims’ computers. Read more »
Kristina Ransomware
If you are introduced to a strange window with the name “KRISTINA” plastered at the top, there is no doubt that an infection dubbed Kristina Ransomware has invaded your operating system. According to the research conducted by Anti-Spyware-101.com research team, this malware is most likely to invade Windows operating systems using fake downloads or, as it is most common, via corrupted spam email attachments. Needless to say, this threat does not invade those systems that are reliably protected by up-to-date anti-malware tools capable of detecting and deleting malicious files in time. If your operating system is not guarded, the devious ransomware is likely to slither in and execute itself without your notice at all. Of course, if you notice it, you must remove Kristina Ransomware right away because this threat has only one goal, and that is to encrypt your personal files. Unfortunately, when it comes to this malware, prevention is key because not much can be done once the files are encrypted. Continue reading if you want to learn more. Read more »
Gibon Ransomware
Have you let Gibon Ransomware in by opening a corrupted spam email attachment or by downloading suspicious files from a questionable source? These are few of the possible ways using which this malware is spread, but it is possible that other methods are employed to distribute it as well. Without a doubt, this infection must be dropped without the user’s notice, or it must be concealed as something else (e.g., a harmless PDF file). If you recognize the threat right away, you are likely to remove it before it is executed and before your precious personal files are corrupted. Because this threat is clandestine, you are unlikely to notice when it slithers in. That is all that this malware needs to initiate malicious processes that are discussed further in this report. Once the infection is done, your personal files are encrypted using a complex algorithm, and you can no longer open them. A special private key is needed for the cipher to be cracked, but, of course, this key is hidden, and cyber criminals want you to pay for it. Instead of doing that, you should delete Gibon Ransomware. Read more »
Pennywise Ransomware
Pennywise Ransomware is the newest variant of Jigsaw Ransomware. It is still in the development phase, judging from the fact that it does not do anything. Even though it claims that it has encrypted your files, it is not true – you can check them yourself after you close a window opened on your screen. Although you can see the clock ticking down in the top-right corner of this window, this threat will not delete your files automatically either. Of course, we cannot promise that the updated version of this ransomware infection will act the same. No matter which of the two versions of this ransomware infection you detect on your computer, you cannot keep this threat on your system because it might cause even more problems. The removal of this ransomware infection should not be very complicated because it only places a window on Desktop. In other words, it is not one of those infections that apply major modifications on victims’ computers following the successful entrance. Of course, before you go to remove it from your computer, you should still read the rest of this article. Read more »