Pakistan-related hackers use Coronavirus health advisories to infect potential victims COVID-19 appears to be not such a bad thing for some remote hackers when it has placed fear throughout the rest of society. Crooks have discovered many ways how to abuse the name of the Coronavirus disease for their own […]
Daily Archives: March 18, 2020
ProLock ransomware is the self-named cryptovirus that uses PowerShell to inject malicious scripts into memory ProLock ransomware – malware that adds .ProLock extension to files after encryption and greets victims with a particular threat name. Virus developers provide all the information in a text file placed on the desktop and […]
ProLock ransomware
Corona-virus-map.com.exe – a malicious file that exploits the COVID-19 outbreak to infect users with malware Corona-virus-map.com.exe is an executable file that runs in the background of Windows operating systems and can be found on the Task Manager. The file indicates that the computer has been infected with the well-known Trojan […]
Corona-virus-map.com.exe
Notice-booster.site – a spam campaign hacking calendars and replacing events with misleading notifications Notice Booster site is a potentially unwanted program[1] that alters settings on iPhone devices and macOS machines. Regarding this fact, the app refers to the iPhone virus and Mac virus categories. Once this threat enters a particular […]
Notice-booster.site
Mokes malware – malicious software that targets users’ banking credentials Mokes malware is a sophisticated backdoor designed to steal personal information from the host machine by employing keylogging, screenshot-taking, and other capabilities Mokes malware is a sophisticated backdoor designed to steal personal information from the host machine by employing keylogging, […]
Mokes malware
ATKL ransomware is the dangerous malware because it contaminates systems and causes serious problems besides file encryption ATKL ransomware – cryptovirus that drops random files on the machine, interferes with processes, applications, and programs to avoid quick virus termination or file recovery. It locks commonly used files and demands payment […]