News

Trickbot levels up Again

When journalists and researchers talk about the information-stealing trojan Trickbot a number of superlatives are used to describe how successful the malware has become. In many cases, Trickbot has earned those superlatives as it is one of the most notorious pieces of malware currently making up the threat landscape. Three recent events in the malware life cycle prove this viewpoint. Early in 2019, Trickbot partnered with the equally notorious ransomware Ryuk in order to share resources and victims. The event showed that the operators behind Trickbot are willing to partner up for the good of turning even more profit. Then in the last quarter of 2019, the malware was upgraded to include a module that allowed for SIM swapping attacks. Then in March of this year Ryuk, with the help of Trickbot, added the Fortune 500 Company EMCOR to the ransomware ever-increasing victim list. Now Trickbot again makes headlines as...

Google releases Data concerning Government-Based Disinformation Campaigns

2020’s news cycle has already been exhausting t...

Silent Night Botnet Emerges from Zeus’ Shadow

It can be successfully argued that the most fam...

Defending against “Flight Risk” Employees

Security firms, media houses, and the InfoSec c...

Top Removal Guides

Pezi Ransomware

Pezi belongs to the family of ransomware called Djvu. It is designed to prevent victims from accessing/using their files by encrypting them, al...

Search.yahoo.com Redirect

Search.yahoo.com is a legitimate search engine, developed by the Yahoo! web services provider. However, users can experience undesirable redire...

Support Forum

This forum was created to individually help our readers with spyware and virus removal. Feel free to post your questions and our staff will do their best to answer them and provide the latest relevant information.

New Removal Guides

Bomba Ransomware

Bomba is a piece of malicious software, belonging to the Scarab ransomware family. Systems infected with this malware have their data encrypted and receive payment demands for the decryption tools/software. During the encryption process, all affected flies are appended with the ".bomba" extension. For example, a file originally named something like "1.jpg" would appear as "1.jpg.bomba" - following encryption. Once this process is finished, a ransom note - "HOW TO RECOVER ENCRYPTED FILES.TXT" is dropped into every compromised folder. Additionally, Bomba ransomware disables Windows Task Manager. The ransom note ("HOW TO RECOVER ENCRYPTED FILES.TXT") informs victims that their data has been encrypted. According to this message, the only way of recovering the files is by purchasing the decryption tools from cyber criminals behind the infection. The note also contains contact details of the criminals - Telegram...

SIGARETA Ransomware

SIGARETA is one of the malicious programs t...

Top Antispyware

SpyHunter 5

Overview: Simply put a rootkit is a program or, more often, a collection of software tools that gives the hacker remote access to and control ov...

Malwarebytes 4.0

There are two versions of Malwarebytes 4.0 - Free and Premium. Although the Free version is capable of removing existing malware, the Premium del...

Top Antivirus

Combo Cleaner: Antivirus and System Optimizer (for Mac computers)

Appearance of Combo Cleaner: Antivirus and System Optimizer: Today, security researchers see a rise in adware targeted at Mac computers. While...

ESET NOD32 Antivirus 2020

Appearance of ESET NOD32 Antivirus 2020: Product Range Like many of ESET’s competitors, the company offers numerous tiers within its product ...

Malware activity

Global malware activity level today:

Medium threat activity

Increased attack rate of infections detected within the last 24 hours.

Virus and malware removal

This page provides information on how to avoid infections by malware or viruses and is useful if your system suffers from common spyware and malware attacks.

Learn about malware removal

Stay in touch with PCrisk