Trojan - Page 29

Home > Trojan

WHAT IS TROJAN HORSE?

This category provides detailed articles about Trojan attacks, and gives instructions on how to remove spyware, keyloggers, cryptominers (cryptocurrency miners), rootkits, typically spread via Trojan infections. If you suspect having a Trojan infection on your system, refer to our Trojan removal guides.

THREAT REMOVAL

Dark Tequila Trojan Removal Instructions — Restore Your Computer From Infections

Dark Tequila Trojan is considered a dangerous virus, detailed information about its operations and removal instructions can be found in our article. It is being used against major services over the years in various attack campaigns. Its modular structures allows…

THREAT REMOVAL

Remove AcridRain Trojan Infections From Your PC

The AcridRain Trojan is a typical example of a computer virus that can cause considerable damage. Our article provides an overview of the virus operations and it also may be helpful in attempting to remove the virus. AcridRain Trojan –…

THREAT REMOVAL

Rocke Miner Removal — Identify and Delete Active Infections

Rocke Miner is a hacking weapon that can infect multiple hosts at once, our in-depth removal article shows how victims can remove active infections. Depending on its exact configuration it can perform various system changes and even deliver other infections.…

THREAT REMOVAL

Remove Cortana.exe CryptoMiner Malware Completely

This article will help you to remove Cortana.exe Miner totally. Follow the removal instructions for the miner malware provided at the end of the article. Cortana.exe Miner is the name of an executable process. The process is designed to be…

THREAT REMOVAL

Turla Trojan Removal Instructions — Restore Your Computer From Infections

The Turla Trojan attacks are currently infecting users worldwide in an offensive campaign. The captured samples showcase that the threat can cause widespread damage on the compromised hosts. Our article provides an overview of the virus operations and it also…

THREAT REMOVAL

AdvisorsBot Trojan Removal — Identify and Delete Active Infections

AdvisorsBot Trojan is a newly discovered hacking weapon which is being distributed against targets worldwide. Its modular engine allows the criminal operators to carry out complex infections utilizing a variety of modules. Our article looks at the typical samples and…

THREAT REMOVAL
Lazarus Group image

New Mac Crypto Exchange Trojan Unleashed by The Lazarus Hacking Group

A well-known North Korean hacking entity, calling itself Lazarus Group has continued it’s activity after hacking Sony Films several years ago and they have now unleashed their newest creation – a Lazarus Trojan for Mac OS machines. Kaspersky researchers have…

THREAT REMOVAL

Kedi Trojan Removal — Identify and Delete Active Infections

The Kedi Trojan is a newly discovered malware that is being distributed worldwide that uses Gmail to communicate with the hacker-controlled servers. The code analysis reveals that it is a complex computer virus that can be used in many infiltration…

THREAT REMOVAL

Remove the AdKoob Malware — a Facebook Stealing Hybrid Trojan/Hjacker Virus

The AdKoob malware is a hybrid Trojan and hijacker virus which has recently been discovered in a global attack campaign. It is distributed using various methods and features many modules that are executed following the infection. Our article gives a…

THREAT REMOVAL
Koadic Trojan image

Koadic Trojan Removal — Restore Your PC From Infections

The Koadic Trojan is a dangerous Python-based RAT that can cause serious damage to infected hosts. It consists of a modular engine and plugins that add to its functionality. Read our in-depth article to learn more about it. Koadic Trojan…

THREAT REMOVAL

Trojan.Redgamble – How to Remove It from Your Computer

This article has been created to explain what is the Redgamble Trojan and how you can remove it from your computer successfully. A new Infostealer Trojan has been detected in the wild, obtaining different information from compromised comptuers. The malware…

THREAT REMOVAL

Zombieboy Trojan Worm – How to Remove It from Your PC

This article has been created in order to explain what is the Zombieboy Trojan and how to remove this worm Trojan from your computer completely. A new Trojan, going by the detection Trojan.Zombieboy has been discovered by security researchers. The…

THREAT REMOVAL
DanaBot Trojan image ransomware note .paradise extension

DanaBot Trojan Removal — Restore Your PC From Infections

The DanaBot Trojan is a dangerous virus infection that specifically targets online banking users. It can cause many system modifications, spy on the users and also deploy other viruses, including ransomware. Read our complete analysis and removal guide to learn…

THREAT REMOVAL

S5Mark VPN (HackTool.Zacinlo) Malware – How to Remove It from Your PC

This blog post has been created to explain what is the HackToo.Zacinlo malware and show how you can remove it from your PC. A new malware, calling itself Zacinlo has been recently detected by Symantec researchers to perform series of…

THREAT REMOVAL

Satamon.exe Trojan (SATA Monitor) – What Is It + How to Remove It

This article has been created with the purpose to explain to you what is the SATA Monitor Trojan and how to remove it completely from your computer. A new Trojan horse, using a process, called satamon.exe has been detected by…

THREAT REMOVAL

Facebook Virus – How to Remove It (for PCs and Smartphones)

This article will help you remove all types of Facebook viruses and scams from your computer and increase your Facebook security. Being the largest social media platform in the world is quite the achievement, but it also comes with quite…

THREAT REMOVAL
Rakhni Trojan image

Rakhni Trojan Removal — Restore Your PC From Infections

The Rakhni Trojan is among the most devastating computer viruses in the last few years combining both a miner and a ransomware engine. It is fairy complex and can evaluate each infected system by running a custom attack sequence. The…

THREAT REMOVAL

RevServicesX (app_loader.exe) BitCoin Miner Virus – How to Remove It

This article has been created to explain what is the app_loader.exe file and what is the RevServicesX BitCoin miner Trojan plus show you how you can remove this threat from your computer completely. A new BitCoin miner malware, going by…

THREAT REMOVAL

All-Radio 4.27 Portable Trojan Removal — How To Restore Your PC

This article has been created in order to explain what is the All-Radio 4.27 Portable Trojan and how to remove this malware completely from your computer. The All-Radio 4.27 Portable Trojan is a dangerous virus instance that is currently being…

THREAT REMOVAL

SocketPlayer Trojan Removal — Restore Your PC From Infections

This article has been created in order to explain what is the SocketPlayer Trojan Trojan and how to remove this malware completely from your computer. The SocketPlayer Trojan is a newly discovered virus that is incorporated into two variants. An…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree