IDP.ARES.Generic Detection

IDP.ARES.Generic is a malware detection name used by Avast and AVG for malicious files. If you see a pop-up with a warning that IDP.ARES.Generic was detected on your computer, it’s possible that your antivirus program just stopped some malware. It is also possible that a safe file was falsely detected. You might need the AVG/Avast … Continued

IDP.Generic Virus

The name “IDP.Generic” is a common detection of malicious files by antivirus programs. The IDP.Generic detection is used by security software like AVG or Avast specifically to identify items that perform unusual behavior. The abbreviation IDP means Identity Protection. Once your antivirus software identifies a certain threat as IDP.Generic, it means that the file was detected … Continued


JasperLoader is malware that spreads other malware, both into your PC, and from it to others. The malware sneaked into your PC can vary in its severity, but in theory could include miners, spyware, adware, even ransomware. The Trojan can also hijack the infected computer to complete tasks for cybercriminals, such as sending infected emails … Continued


Trojan.Jorik is a dangerous Trojan infection that can take control of your system and disturb your computer activity. It can spread over systems though networks and infect any computer systems. Once inside the system Trojan.Jorik can download some malware to your machine. It also seeks to gather some private information including your bank account details … Continued

JS.Downloader Trojan

JS.Downloader is a detection Trojans based on Javascript, that is a language that is run in browsers and used to make page more interactive. The language might be used for harmfull purposes as well. Such Trojans have been known for years but keep infecting tons of online users to this day. The most obvious sign … Continued

JSMiner virus

JSMiner is a family of trojan viruses that can come by different names, such as JS:Miner-A, JS:Miner-C, JS:Miner-E and so on. The letter JS stands for JavaScript, because this malware is using this programming language to infect computers. There are more than just one version of this infection and it can be distributed in various … Continued


Kilim is a Trojan virus that can cause serious problems to computer system. The program easily gets access to your personal data that can later be used for malicious purposes and it can expose your computer to other threats. The Trojan infiltrates into random computers without users’ knowledge, usually when the one clicks on some … Continued

Kpot Stealer

Kpot is an info-stealing trojan. It spreads in malicious email spam and malicious websites. Once Kpot is on a computer, it extracts saved credentials, payment methods, and other information from browsers and other apps. It then sends that information to malicious actors. After removing Kpot, it’s advised to change your passwords and to watch your bank … Continued

LokiBot trojan

Recently the new variant of the malicious trojan called LokiBot was noticed by some cyber enthusiasts ,  , quickly spreading not only in Androids like it used to a year ago (), but also in Windows OS as well. While it acts slightly different on these two platforms Lokibot is equally dangerous for both. (Learn … Continued

Your Mac Might Be Infected! Scam

“Your Mac Might Be Infected!” scam is a fraudulent message, stating that your Mac device is infected with viruses. It is similar to fake alerts like “Warning! Windows may be infected” or “Internet Security Alert! Code: 055BCCAC9FEC”. Such scams use warnings to convince people to contact fake tech support. Technical support scams usually exploit malware … Continued

Macro Virus

Macro virus is a form of computer parasites that attaches itself to various documents and files instead of programs. Word documents, pdf’s or spreadsheets are used as all these programs have capability to run scripts or “macros”. The viruses are either written in , that is used by Microsoft programs (Word, Excel, etc), Javascript (for … Continued

Malex Trojan

Malex Trojan is a parasite showing various ransom messages. At the moment it is used for ransomwares that displays a fake notification imitating a message from FBI. The message blames you for breaking some Copyright and Related Rights Law by viewing or distributing pornographic content. Once infected, your computer will be completely locked and you … Continued

MassMiner malware

MassMiner malware is a new crypto-currency mining infection, and security researchers learned of its existence at the beginning of May, 2018. We have discussed many crypto-currency related scams and cyber attacks. One of the more interesting articles investigated the possibility of crypto-mining malware slowly replacing ransomware. Besides this new crypto-malware dubbed MassMiner, we have also … Continued

Mebroot Trojan

The Mebroot Trojan is the first new trojan found in the wild, which modifies the MBR (Main Boot Record). This trojan is usually installed via drive-by downloads, reportedly from Once inside, this parasite detects the active boot partition and infects the MBR. The original MBR is copied to sector 62 of the hard disk. … Continued

Microsoft Office Activation Tech Support Scam

Microsoft Office Activation technical support scam (also referred to as a pop-up) has been named after the dialog box it pops up. The pop-up window is named Microsoft Office Activation Wizard. This tech support scam revolves around the topic of the activation of the Microsoft Office Package, which encompasses such programs as Excel, OneNote, Outlook, … Continued

MSASCuiL Malware

MSASCuiL is a program for displaying the Windows Defender notification icon. If you can verify that it’s the real Windows process, then that’s what it is. However, cybercriminals have stolen the names of genuine Windows processes before, and MSASCuiL is no exception. If you have MSASCuiL malware, then that should be removed as quickly as … Continued


Necurs is a trojan that is used by cyber criminals to open a back door of an infected computer for a remote user to take over it. It will also turn off existing computer security programs leaving your PC unprotected and easy to harm by more infections. Symptoms of the infection that can be seen … Continued

NetGroove Trojan

NetGroove infection is a tabbed browser based on Cromium. It is a freeware tool, created by RCPSoft company. While this browsing application seems legitimate and the company even encourages its clients to inform them of any bugs, we have our suspicions that this tool is not as reliable as it appears. First of all, the … Continued

Network Control

Network Control, sometimes called Network Control Solution Center, is a Trojan that pretends to be a legitimate security application. It states that remote administrator named Adam1 has changed some system files of Windows OS. This ransomaware is promoted mostly through the use of fake online scanners and other bogus websites which state that your computer … Continued


Nivdort – the name of big trojan family known for collecting various information infected computers. There are more than a dozen of names on this trojan family, such as TrojanSpy:Win32/Nivdort.BE, TrojanSpy:Win32/Nivdort.BN, TrojanSpy:Win32/Nivdort.BU, TrojanSpy:Win32/Nivdort.BV, TrojanSpy:Win32/Nivdort.CC, TrojanSpy:Win32/Nivdort.CD, TrojanSpy:Win32/Nivdort.V, TrojanSpy:Win32/Nivdort.W, TrojanSpy:Win32/Nivdort.Y and TrojanSpy:Win32/Nivdort.Z. Usually trojans from Nivdort family travels attached to spam emails. Those letters are developed to look like valid messages … Continued

NRSMiner Malware

Have you noticed that your computer suddenly started to run significantly slower, even though you haven’t made any significant changes? The true reason behind that might be a crypto miner, which has successfully infected your computer and now is mining some cryptocurrency while using your electricity and computer resources. It wouldn’t be that bad if … Continued

OInstall.exe Virus

Usually, OInstall.exe is a legitimate Microsoft Office installer. However, a modified version of OInstall.exe is used by pirates who want MS Office for free. It is often detected by antivirus programs as malware. Whether the pirated version of OInstall.exe is dangerous is not certain, but that is a real risk: truly dangerous malware is often brought … Continued

OSAMiner Mac Malware

OSAMiner is a miner infection that causes the infected Mac to be slow and hot. It does this by using the computer’s resources to mine cryptocurrency. OSAMiner has been around since 2015 and it spreads with pirated games and other apps. It infects Macs and stops anti-malware apps and Activity Monitor in order to avoid … Continued

Padlock Screen Locker

Inside of the free software bundles you can actually find the whole bucket of cyber bugaboos, starting from all kinds of adwares and ending with crypto-malwares, asking for ransom payments. You can also find there viruses, named as screen lockers. This type of malware, as the title indicates, locks the screen of the compromised computer, … Continued

Poweliks Trojan

A Poweliks infection is listed as a Trojan virus that can infiltrate a number of other malicious applications present onto your computer. Usually it travels via exploit kits that lurk on hacked websites, so it’s really difficult not to encounter this Trojan – you never know which website can be infected. Poweliks targets the following versions of … Continued

Proteus Trojan

McAfee Labs by Intel Security detect Proteus malware as W97M/Proteus trojan. Though, it was first detected on the 28th of November, 2016, by the researchers from Fortinet as MSIL/Proteus.A!tr. Written in .NET, this trojan has been named, a new all-in-one botnet. Since it bears a number of the following malicious functionalities: it operates as a … Continued


Pw.exe is the executable file of huge Fake antispywares’ family that has been noticed in the middle of November trying to rip users off. Its campaign is based on telling that computer is infected with malware and then offering to purchase removal program which is always named differently. In fact, this scam has 27 different … Continued

PWS-Zbot virus

PWS:Win32/Zbot is the name for one of Trojan families. It has been generated by black market kits called Zeus. PWS-Zbot can get inside a computer distributing it in spam e-mail. It might also infiltrate using auto run capabilities of removable media. One more way to be infected with PWS-Zbot Trojan is while browsing compromised or … Continued


QueueAlgorithm is a malicious app that causes browser redirects and ad spam. QueueAlgorithm is adware and it infects Macs by tricking victims into downloading it by pretending to be safe and legitimate software. When deleted, QueueAlgorithm may return after a few hours or days. That happens because not all of its files were deleted – … Continued

Quick Searcher Miner Trojan

Quick Searcher belongs to the same category of disturbing online threats like Soft Cores Miner. However, this article will focus on a miner which is distributed through an extension for Google Chrome browser. This strategy is not unheard of, but it is one of the novelties we are yet to fully examine. Just recently, we … Continued


QuilMiner acts as a Trojan Horse with capabilities of using the system resources for the purpose of mining digital currencies. For instance, it mines Ethereum, Dash, Bitcoin and Monero. This is done without the user’s consent and does not result in any financial benefit for the victim. QuilMiner performs its on PCs with Nvidia, AMD … Continued

Rannoh trojan

Rannoh is a malicious Trojan that has two main features: it is designed to lock its victims out of Windows and encrypts the majority of the files found on the target PC. If you have been infected with this ransom trojan, you should remember Gendarmerie Nationale (French) virus that locates its files almost in the … Continued

Reveton Trojan

Reveton Trojan is responsible for large amount of fake applications claiming to be from local police or other legal institutions and locking you out from windows. Typically, it is distributed through Citadel botnet, though other ways of infection are possible. As soon as it gets inside the computer, Reveton blocks it completely and displays a … Continued


Rimod trojan (aka Trojan:Win32/Rimod ) is a group of PC parasites that perform specific actions to ones PC. All parasites from this group modify PC security settings to disable or minimize protection and limit the possibility of detection and removal. This makes these trojans quite dangerous and such parasites should be removed from ones PC. … Continued redirect is a one more annoying browser hijacker that attacks random computer systems. It affects your search results as you get redirected to after you type something into Google or Yahoo search engines. It can modify your browser setting no matter if you use Internet Explorer, Google Chrome or Mozilla Firefox. Usually, it even … Continued

Securedisk.exe CPU Miner Trojan

Securedisk.exe CPU Miner Trojan is an infection with a very specific purpose: to slither into operating systems and secretly mine various types of cryptocurrencies. It pretends to be a legitimate version of LaCie Private-Public encoding software. However, it actually is a Trojan, hidden behind a legitimate name. This miner is bound to generate a scheduled … Continued

Select Region Tech Support Scam

Select Region (Please Select Region to Continue) is a screen-locker, which displays two messages. First one requites users to enter specific information about their device: some of it is already generated, like the name of a device, type of a operating system, while other info can be modified. After users will click the button “Next”, … Continued

Shadowsocks Trojan

You have definitely heard of cryptocurrencies before. It is a very profitable niche and everyone tries to jump into this train of money right now. Unfortunately, some individuals explore deceptive ways to earn virtual money and regular users become victims. In this case, we are talking about Shadowsocks Trojan virus. It was designed with a … Continued

Shamoon Malware

Detected in 2012 by Forcepoint (former Websense), Seculert and Kaspersky, Shamoon malware, aka Disttrack, has returned. On the 17th of November, 2016, at 20:45 local time Shamoon attacked a Saudi oil company Aramco. 30,000 computers have been affected. Shamoon, in the previous and in the recent attacks, has aimed at deleting the data from hard … Continued

Shlayer Trojan

Shlayer Trojan is malware that targets Mac users with fake Flash Player updates and installs adware on their devices. It’s an extremely popular trojan that’s attempted to infect millions of Macs around the world. Those who got Shlayer Trojan see their apps crash, their internet connection slow down, and pop-up ads in their browser and … Continued


Sirefef (aka Trojan.Dropper.Sirefef) is a malicious multicomponent trojan family, which modifies search results, generated pay-per-click traffic for cybercriminals. This family consists of different components, which performs different tasks like downloading updates and additional malware, then hiding it from the system and running payloads. This classifies it as Dropper Trojan. Sirefef variants may display pop up … Continued

Skype Virus

Skype virus is a trojan, distributed through Skype network only.  This trojan is spread via Skype. This is how it works. A victim receives a message containing a link sent by one of his (her) Skype friends. The message might mention your name and look real. All of the infected persons friends using Skype receive … Continued

SmokeLoader trojan

While Fifa World Cup 2018 is taking place the new virus releases have decreased significantly, and yet it seems like this event didn’t affect the old malware, whose updated variants are coming back to life ready to shake the ground of the virtual world. A few days ago we wrote about Zacinlo, which after a few … Continued


If you notice Smss.exe process currently running in the Windows Task Manager, do not be hasty to panic. What is this file? What does it do? Actually, this is a regular procedure in Windows OS devices and if the legitimate version is present in your system, there is no need to express concerns. However, malicious … Continued

Soft Cores Miner

Soft Cores Miner, also known as systemcore.exe is a dangerous trojan that aims to infect computers and secretly mine cryptocurrencies by stealing computing power and causing all kinds of troubles. The biggest problem regarding trojans like this – they are really difficult to detect. Things get easier if you have reliable anti-malware tool installed on … Continued


SpyEye (or EyeSpye) is a Trojan horse, which has almost the same codebase as Zeus Trojan. Just like infamous Zeus, SpyEye collects certain information on the compromised computer and additionally uploads it to command-and-control servers. To make it possible, this trojan includes wide range of components depending on configuration: it may have contain modules for … Continued

StartWebLogic.exe CPU Miner

StartWebLogic.exe CPU Miner is a sneaky computer virus that is looking to infect as much systems as possible and turn them into slaves – the miner uses power of certain computer components (CPU or GPU) and mines cryptocurrencies. Even though it is not as dangerous as ransomware viruses or keyloggers, that can directly steal your … Continued

Stresspaint malware

Stresspaint (or the Relieve Stress Paint Tool) malware is a new cyber threat, and security researchers are warning that it is a very sophisticated variant. The infection uses highly-professional methods of distribution and is capable of stealing users credentials, personally-identifiable information, and could even initiate deceptive advertising campaigns. A lot of free programs might seem … Continued

Sweep Clean PC Pro

Sweep Clean PC Pro is a trojan program which disguises itself as a technical support application. These type of apps generally display pop-ups of fake security warnings. It is a sneaky marketing trick to make up a problem and offer solutions on how to solve it, which makes a myriad of people to fall for … Continued

TDSS rootkit

TDSS Rootkit or TDSS is Trojan that is designed to work together with malware. Once this rootkit manages to get inside the system, it downloads and executes other threats, interrupts its victims with annoying ads and disables them from using security and other programs. It is known under several names, like Alureon, TDL3, TDL4, and … Continued

Recent Posts

Security Guides

Recent Comments