Author Archives: Max Lehmann - Page 19

Catelites: Android Malware That Faked Login Pages to Hijack Accounts

Reports suggesting that banking malware is on the rise once again keep coming out, and so it is important to remind ourselves how this malware operates. In this report, we analyze Catelites, an infamous banking malware that used fake apps on Android to attack unsuspecting users. This malicious threat was used primarily as a data stealer, and while it was, most likely, used to steal login credentials from banking apps, it could have stolen logins from any app that the user was opening. The only condition was that the infection could create an overlay for this app. Read more »

Movies123 Ads

Movies123 Ads

Have you been bombarded by random pop-ups that try to convince you to purchase something? Maybe you see Movies123 Ads every day and you don’t know how to get rid of them? You must have been affected by a potentially unwanted program that generates commercial advertisements.

Potentially unwanted programs and adware are not downright malicious infections but it would be a good idea to remove Movies123 Ads and anything similar from your system as soon as possible. While you can’t remove the ads themselves (they are generated online), you can remove the programs that utilize them and restore your browser settings to default. Read more »

MGS Ransomware

MGS Ransomware

MGS Ransomware is a dangerous computer infection that will try to swindle you out of your money. It might not be the highest profile ransomware infection out there, but it can still successfully encrypt your files, so you should not take this program lightly.

At the bottom of this description, you will find the manual MGS Ransomware removal guidelines, but manual removal might be a bit too bothersome for you. If you feel that you need a helping hand, you can always acquire a licensed antispyware tool that will help you remove this infection from your system for good. Read more »

Marcher Banking Trojan Uses Overlays to Gather Login Credentials

The Marcher banking Trojan is not a new threat. In fact, you might have heard of this infection in one way or another throughout the years because it has been around since at least 2013. Obviously, it has not stayed the same. In fact, it has changed quite a bit, and there are now numerous different versions of this threat that we could talk about. In this report, however, we take a look at the whole picture. Obviously, if you suspect that this malware might have invaded your Android device, it is crucial that you delete it immediately. However, we hope that you read this before the invasion, so that you could take appropriate security measures first. If you are interested, please continue reading. Read more »

VIAGRA Ransomware

VIAGRA Ransomware

VIAGRA Ransomware is one of those ransomware infections that may look extremely dangerous, but whatever they perform on your computer can eventually be countered. What we mean is that it is possible to decrypt the files affected by this infection, but you might need professional help with that.

Since there is no need to panic when you get infected with this program, you can proceed to VIAGRA Ransomware removal. Please find the manual removal guidelines at the bottom of this description. For more efficient malware removal, do not hesitate to invest in a powerful antispyware tool. Read more »

Plague17 Ransomware

Plague17 Ransomware

The “.PLAGUE17-{ID}” extension attached to your personal files indicates that Plague17 Ransomware has slithered in and encrypted them. According to our malware research team at Anti-Spyware-101.com, it looks like this infection was created to attack Russian-speaking Windows users, and if you can identify yourself as one, you need to be cautious. It is most important that you secure your operating system before the infection even manages to slither in, as prevention is most important in this situation. So, how are you supposed to prevent malware from slithering in? It is crucial that you install trusted anti-malware software to protect you against invaders. It is also important that you update your operating system and software to ensure that no vulnerability is left unpatched. Finally, it is crucial that you stay away from suspicious downloaders, spam email attachments, links, warnings, etc. If it is too late, remove Plague17 Ransomware, but do not forget to reinstate Windows security afterward. Read more »

Vesrato Ransomware

Vesrato Ransomware

Your personal files are doomed if Vesrato Ransomware slithers in. This infection targets Windows operating systems that lack protection, and whose owners are not careful enough. Misleading messages containing corrupted attachments, dangerous bundled downloaders, silently active infections, and unpatched security vulnerabilities could all be exploited to ensure that this malware invades systems. If you are not cautious, it could invade your system too, and it is unlikely that you would notice this threat until it was too late. Although you might have a quick moment in between when the threat attacks and when the encryption of personal files begins, it is unlikely that you will be able to catch it. Instead, it is likely that you will realize that there is malware that requires removal only after your files are encrypted. Can you delete Vesrato Ransomware to restore the files? You definitely need to eliminate the infection, but you cannot recover your files by doing so. Read more »

MedusaHTTP

Do you want your operating system exploited in the attacks performed by cybercriminals? Of course, you do not, and that is why MedusaHTTP is the threat that you need to be very aware of. According to our malware experts at Anti-Spyware-101.com, if this infection is able to invade your operating system, that could give remote attackers greater powers to perform attacks against companies, governments, and other big targets. Surely, you do not want to be involved. Unfortunately, once this malware adds your system to the botnet – a large system of Internet-connected devices – you might be unaware of it. This is why it is important to have your system protected and updated, and why routine system scans must be performed. So, have you identified this threat already? If you have, your goal is to delete MedusaHTTP as soon as possible. Please continue reading this report to learn how to perform removal, as well as how to secure your operating system against this malware in the future. Read more »

Ecleneue.com

Ecleneue.com acts silently, and so you might not notice this adware helper at all. Instead, you should notice advertisements because it is an adware helper, and its main task is to introduce people to ads. How does that happen? Most likely, adware – which is short for advertising-supported software – is involved, but it is also possible that the helper delivers ads using enabled notifications, or by redirecting users to ad pages from unreliable websites. If adware exists, a malware scanner will identify it, and you will be able to remove it. However, if no threats are found, but suspicious and undesirable ads keep showing up and interrupting your daily tasks, it is possible that you might have to disable some unwanted notifications. We can help you with that. Hopefully, if you follow our recommendations, you will be able to have ads from Ecleneue.com deleted permanently. If you face issues, remember that you can always contact us via the comments section below. Read more »

Grethen Ransomware

Grethen Ransomware

Grethen Ransomware is one of those malicious applications that ruins your files and then shows a note saying you must pay if you want to get them restored. The problem is that people who create such malware cannot be trusted and no matter what they say, in reality, there are no guarantees they will provide the decryption tools they promise. Thus, if you receive such a threat, you might have nothing left to do but to hope you have a backup of your most important files. To learn how it enters a system, how it works, and what to do to get rid of it, you should continue reading this article. For detailed instructions on how to erase Grethen Ransomware manually, we recommend checking the steps available below the text. Read more »