Trojan - Page 42

Home > Trojan

WHAT IS TROJAN HORSE?

This category provides detailed articles about Trojan attacks, and gives instructions on how to remove spyware, keyloggers, cryptominers (cryptocurrency miners), rootkits, typically spread via Trojan infections. If you suspect having a Trojan infection on your system, refer to our Trojan removal guides.

THREAT REMOVAL
trojan

Remove TrojanDownloader:AutoIt/Gedo and Protect Your PC

Trojan horses have affected thousands of users on a global scale. There are different types of Trojan attacks, depending on what information cyber criminals are attempting to steal. Trojan downloaders are quite common among home users. Microsoft has recently detected…

THREAT REMOVAL

Remove VirTool:Win32/Obfuscator.XX and Scan Your PC

User complaints have been registered about a threat dubbed VirTool:Win32/Obfuscator.XX. The VirTool:Win32/Obfuscator.XX may be a false positive triggered by pirated software, or could be employed by malware. To determine the origin of the threat, a full system scan may be…

THREAT REMOVAL
ransomware

Backdoor:MSIL/Bladabindi.AJ Removal from the System

Backdoors are quite damaging to the system and should be removed immediately. Backdoor:MSIL/Bladabindi.AJ is one of the latest backdoors reported by Microsoft. It belongs to the MSIL/Bladabindi family designed to steal sensitive data and send it to hackers. It is…

THREAT REMOVAL
p16_0000

Remove H-worm VBS worm from the System

A Computer worm is a malicious piece of software that should be removed instantly from the infected PC. H-worm falls under the category of VBS (Visual Basic Script) worms. It is also reported to have RAT (remote access Trojan) capabilities…

THREAT REMOVAL
Botnet-example

Shifu Trojan Hits 14 Banks in Japan in a Sophisticated Attack

A Banking Trojan is one of the many types of Trojan Horses. In computer and network safety, a Banking Trojan is any malicious program deployed to obtain confidential information about a bank’s customers and online banking systems. We have observed…

THREAT REMOVAL
p15_0000

HTML/ScrInject.B.Gen – More About and How to Remove

Online security software keeps identifying a threat going by the name of HTML/ScrInject.B.Gen. It is reported to be associated with some websites and many users tend to believe that it is a false positive, i.e. not a real threat due…

THREAT REMOVAL
warning-trojan

Trojan:Win32/Dorv.B!rfn Removal And Description

This particular type of trojan is reported by ESG security researchers to distribute mainly via drive-by downloads in the form of Java or Flash Player updates. It could also be embedded with free software downloaded from unfamiliar third parties. It…

THREAT REMOVAL
p15_0000

Remove SoftwareBundler:Win32/FakeDiX from the PC

SoftwareBundler:Win32/FakeDiX is a suspicious application that compromises the PC’s safety and performance. SoftwareBundler:Win32/FakeDiX is presented as a tool that downloads DirectX. However, it doesn’t. Instead, it creates suspicious .dll files on the system and injects malicious code to prevent detection.…

THREAT REMOVAL
ransomware

CoreBot Trojan Removal and Description

A dangerous malware infection has been detected out in the wild. It is called CoreBot, and it can cause a lot of havoc and headaches to many users. It is focused mainly on stealing information without any restrictions what so…

THREAT REMOVAL
trojan

TrojanDownloader:MSIL/Winpud.A Removal Manual

What Is TrojanDownloader:MSIL/Winpud.A? TrojanDownloader:MSIL/Winpud.A is a really dangerous infection that you do not want on your computer. This is a big threat and can cause all kinds of harm for your system, including stealing all of your important information. You…

THREAT REMOVAL
trojan

Remove TrojanDownloader:AutoIt/Fadef Fully From Your PC

A new type of trojan going by the name of TrojanDownloader:Autoit/Fadef has been reported to infect numerous PCs worldwide. This particular trojan horse is a downloader type, meaning that it modifies individual permissions that allow it to download and install…

THREAT REMOVAL
p16_0000

Antivirus Blocking Rules Removal Instructions

Antivirus Blocking Rules is used by many threats with the sole purpose to bypass cyber security in computers -anti-malware, antivirus, firewalls. Antivirus Blocking Rules may be quite damaging because very dangerous threats employ them without any restriction what so ever.…

THREAT REMOVAL
p16_0000

Remove Suspicious.Cloud Variants from the System

Suspicious.Cloud is an anti-malware technology created in 2010. It is designed to detect malicious software without it (the malware) having to be included in a malware database. Suspicious.Cloud will just go after the features of known malware threats. A Suspicious…

THREAT REMOVAL
warning-trojan

Remove Trojan:Win32/Colisi.F. Detect GoogleUpdate.dll File Infection

Trojan:Win32/Colisi.F is a Trojan horse that has several variants. According to security researchers, the threat can be located in the Google directory of the infected system. The main file of the Trojan most likely is GoogleUpdate.dll. Since the .dll file…

THREAT REMOVAL
p15_0000

Remove SecurityRisk.First4DRM, Sony Rootkit

First4DRM, also known as SecurityRisk.First4DRM is an online threat classified as a rootkit. It was first published back in 2007 by First 4 Internet Ltd., but apparently has been exploited for malicious intentions.The rootkit is designed to hide particular processes,…

THREAT REMOVAL
ransomware

Remove wormp2p.tanked.trojanv1.1 from the System

Several user reports have been registered about a threat called Wormp2p.tanked.trojanv1.1 appearing on a Windows Firewall alert. wormp2p.tanked.trojanv1.1 is most likely distributed via file sharing on peer-to-peer communities. Other similar threats have been monitored during the past several months. In…

THREAT REMOVAL
p16_0000

Rane.exe, Generic Dropper.agu Detection and Removal

In some cases, malware is reported to take over certain .exe files to spread onto computers. In other instances, .exe files sneak into the system and turn out to be Trojan horses or other types of malicious software. If you…

THREAT REMOVAL
ransomware-virus

JS/Banker.BA JavaScript Trojan Removal Manual

JS/Banker.BA is classified as JavaScript Trojan that is currently attacking users and obtaining their banking credentials. What most probably happens is the user logs in his bank account with his password, and his anti-virus program (if any) displays a notification…

THREAT REMOVAL
p11_0000

Updater.exe – Removal and Description

Many users have reported in forums seeing an unfamiliar process, going by the name of updater.exe. Experts from file.net have concluded that this process is not a natural Windows system process, and measures should be taken towards the removal of…

THREAT REMOVAL
p11_0000

Remove TrojanSpy:Win32/Bholog from the System

Microsoft has recently detected TrojanSpy:Win32/Bholog.B as a Trojan horse and spyware. Numerous AV programs detect the threat. Hence, it has a high detection rate. TrojanSpy:Win32/Bholog.B is most likely distributed via spam email attachments and corrupted websites. The threat may also…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree