Trojan - Page 39

Home > Trojan

WHAT IS TROJAN HORSE?

This category provides detailed articles about Trojan attacks, and gives instructions on how to remove spyware, keyloggers, cryptominers (cryptocurrency miners), rootkits, typically spread via Trojan infections. If you suspect having a Trojan infection on your system, refer to our Trojan removal guides.

THREAT REMOVAL
1460565185_Wifi

Remove Jiton JavaScript Malware from Your Router

Researchers at TrendMicro have managed to discover and research a JavaScript-based malware which has an unusual approach when it comes to infection. The malware is reported to come obfuscated and attack the DNS (Domain Name System) of the router. Not…

THREAT REMOVAL
shutterstock_278999798

TreasureHunt PoS Malware Description and Removal

A new malicious virus has been detected and reported to attack PoS systems of primarily small businesses. The malware enters the user PC via spam mails, and it carefully selects what kind of information to collect from infected users. The…

THREAT REMOVAL
shutterstock_223094779

Remove PowerSniff PoS Malware and Protect Yourself from It

A new file-less malware has been spotted to send out approximately 2000 spam e-mails per week to users. The malware does not have any files, but instead it spreads via infected Microsoft Office macros. All users who have been affected…

THREAT REMOVAL
shutterstock-malware

Woniore Worm – Description and Removal

A new worm has been reported by security experts to spread across portable drives. It is named Woniore, and the worm uses conventional tactics to infect user PCs. The damage which the worm can do to users can often vary…

THREAT REMOVAL
remove ludashi adware program sensorstechforum removal guide

Fully Remove Ludashi 5.0 Program in Windows

Users have complained about various online security forums that they have experienced issues with the software called Ludashi. The Chinese program has been reported numerous times to display significantly annoying pop-ups to users. It also has bundled software and most…

THREAT REMOVAL
shutterstock_248596792

Remove Poshedo Trojan Completely from Your PC

A new downloader type of Trojan has been reported to cause unauthorized downloads on user PCs infecting them with malware. The Trojan.Downloader may use obfuscators to conceal itself from most widespread antivirus software’s real-time protection. You may encounter this Trojan…

THREAT REMOVAL
shutterstock_223094779

Remove Banprox Infostealer Trojan Completely

A Trojan that is known as Banprox.Infostealer has been identified by Symantec threat response team to infect personal computers on various locations all over the world. The Trojan is very specific in it’s actions, redirecting the web traffic of the…

THREAT REMOVAL
shutterstock_248596792

Remove KillDisk Disakil Trojan Completely and Protect Your Files

A new type of Trojan has been reported to utilize an old devastating method that corrupts Windows and restarts the computer. The Trojan is known as Disakil (Symantec), and it is not very widespread. However, this particular Trojan horse may…

THREAT REMOVAL
SensorsTechForum-Komprogo-backdoor-trojan-horse-malware-ransomware-spread

Remove Coinbitclip Hearthstone Trojan Completely

A new type of infostealing Trojan is reported to aim at the cryptocurrency BitCoin, replacing It’s addresses with malicious ones. The Trojan creates multiple files via obfuscated executables, and it aims to stay concealed for as long as possible on…

THREAT REMOVAL
malicious-threat-sensorstechforum

Remove Loioir DDoS Malware Completely from Your PC

Loioir is a type of malware that has been reported to cause severe Denial-of-service attacks. The malware drops its payload modules in Windows folders and modifies Windows Registries so that the malware runs every time Windows is booted up. It…

THREAT REMOVAL
skype spamming virus

Remove Goo(.)gl Skype Spamming Virus Completely

A new string of malware has been spotted by security researchers to affect Skype users. Complaints have risen that the virus uses goo(.)gl spamming URLs to redirect to file-sharing sites which may contain its malicious payload. All users who have…

THREAT REMOVAL
trojan-infected

Remove Pitou Trojan and Bootkit Completely from Your PC

A very sophisticated kernel-based Trojan and bootkit connected to it have been spotted to infect computers on a global scale. The Trojan has changed its distribution methods making them, even more, sophisticated. Its bootkit is reported to interact with BIOS’s…

THREAT REMOVAL
STF-spymel-trojan-horse-command-control-server-remote-location-file-registry-settings

Remove Spymel Trojan Completely

Spymel is the name given by Zscaler researchers to a newly found Trojan horse. The Trojan can spy on all user activity. It may log keystrokes and steal information on a compromised computer and send the data to a remote…

THREAT REMOVAL
shutterstock_248596792

Remove TrojanDropper:Win32/Sventore.A Completely

A new Trojan.Dropper has been detected by Microsoft`s security software to infect user systems. Microsoft report that the Trojan may download other malicious files on the infected computes as well as upload files to the cyber-criminal who is controlling it.…

THREAT REMOVAL
android spam

Remove Koobface Facebook Worm from Your PC

An extremely dangerous worm has been the main topic of discussion in the online security community lately. Known as the Koobface botnet it is a malware infection that aims to spread to as many computers as possible. As the name…

THREAT REMOVAL
Trojan-Horse

Remove Trojan.Win64.Patched.qw Completely

A Win64 trojan, detected as Trojan.Win64.Patched.qw has been reported as a high risk type of cyber threat with the potential to be devastating to your computer. The Trojan is usually distributed over infected .exe objects, spam mail, porn sites and…

THREAT REMOVAL
trojan

Remove Ingreslock Backdoor and Lock TCP 1524

Security reports have appeared regarding a network vulnerability, identified as Ingreslock backdoor. Ingreslock is a legitimate service that locks parts of an Ingres database and uses TCP 1524 (Transmission Control Protocol). What is troublesome is that the 1524 port is…

THREAT REMOVAL
SensorsTechForum-backdoor-trojan-horse-malware-ransomware-spread

Remove TrojanSpy:Win32/Nivdort.CT From Your Computer

A new spyware type of Trojan has been reported by Microsoft to infect user systems. The trojan is reported to create multiple files in an infected computer that have different functions. The threat is primarily reported to steal sensitive user…

THREAT REMOVAL
warning-trojan

Trojan.Sakurel.B Backdoor Removal Manual

Trojans that can act as backdoors are particularly alarming since they enable malicious actors to perform a range of dangerous activities. Trojan.Sakurel.B is classified as a backdoor type of a Trojan that is currently active in the wild. In order…

THREAT REMOVAL
STF-RAT-python-Pupy

Pupy RAT Description and Removal

There is a new RAT (Remote Access Tool/Trojan) that goes by the name of Pupy. It is open-source so everybody can have full access to its capabilities. It can be used by administrators, penetration testers, engineers, but unfortunately, also by…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree