Trojan - Page 34

Home > Trojan

WHAT IS TROJAN HORSE?

This category provides detailed articles about Trojan attacks, and gives instructions on how to remove spyware, keyloggers, cryptominers (cryptocurrency miners), rootkits, typically spread via Trojan infections. If you suspect having a Trojan infection on your system, refer to our Trojan removal guides.

THREAT REMOVAL

Turla Trojan Removal Instructions — Restore Your Computer From Infections

The Turla Trojan attacks are currently infecting users worldwide in an offensive campaign. The captured samples showcase that the threat can cause widespread damage on the compromised hosts. Our article provides an overview of the virus operations and it also…

THREAT REMOVAL

AdvisorsBot Trojan Removal — Identify and Delete Active Infections

AdvisorsBot Trojan is a newly discovered hacking weapon which is being distributed against targets worldwide. Its modular engine allows the criminal operators to carry out complex infections utilizing a variety of modules. Our article looks at the typical samples and…

THREAT REMOVAL
Lazarus Group image

New Mac Crypto Exchange Trojan Unleashed by The Lazarus Hacking Group

A well-known North Korean hacking entity, calling itself Lazarus Group has continued it’s activity after hacking Sony Films several years ago and they have now unleashed their newest creation – a Lazarus Trojan for Mac OS machines. Kaspersky researchers have…

THREAT REMOVAL

Kedi Trojan Removal — Identify and Delete Active Infections

The Kedi Trojan is a newly discovered malware that is being distributed worldwide that uses Gmail to communicate with the hacker-controlled servers. The code analysis reveals that it is a complex computer virus that can be used in many infiltration…

THREAT REMOVAL

Remove the AdKoob Malware — a Facebook Stealing Hybrid Trojan/Hjacker Virus

The AdKoob malware is a hybrid Trojan and hijacker virus which has recently been discovered in a global attack campaign. It is distributed using various methods and features many modules that are executed following the infection. Our article gives a…

THREAT REMOVAL
Koadic Trojan image

Koadic Trojan Removal — Restore Your PC From Infections

The Koadic Trojan is a dangerous Python-based RAT that can cause serious damage to infected hosts. It consists of a modular engine and plugins that add to its functionality. Read our in-depth article to learn more about it. Koadic Trojan…

THREAT REMOVAL

Trojan.Redgamble – How to Remove It from Your Computer

This article has been created to explain what is the Redgamble Trojan and how you can remove it from your computer successfully. A new Infostealer Trojan has been detected in the wild, obtaining different information from compromised comptuers. The malware…

THREAT REMOVAL

Zombieboy Trojan Worm – How to Remove It from Your PC

This article has been created in order to explain what is the Zombieboy Trojan and how to remove this worm Trojan from your computer completely. A new Trojan, going by the detection Trojan.Zombieboy has been discovered by security researchers. The…

THREAT REMOVAL
DanaBot Trojan image ransomware note .paradise extension

DanaBot Trojan Removal — Restore Your PC From Infections

The DanaBot Trojan is a dangerous virus infection that specifically targets online banking users. It can cause many system modifications, spy on the users and also deploy other viruses, including ransomware. Read our complete analysis and removal guide to learn…

THREAT REMOVAL

S5Mark VPN (HackTool.Zacinlo) Malware – How to Remove It from Your PC

This blog post has been created to explain what is the HackToo.Zacinlo malware and show how you can remove it from your PC. A new malware, calling itself Zacinlo has been recently detected by Symantec researchers to perform series of…

THREAT REMOVAL

Satamon.exe Trojan (SATA Monitor) – What Is It + How to Remove It

This article has been created with the purpose to explain to you what is the SATA Monitor Trojan and how to remove it completely from your computer. A new Trojan horse, using a process, called satamon.exe has been detected by…

THREAT REMOVAL

Facebook Virus – How to Remove It (for PCs and Smartphones)

This article will help you remove all types of Facebook viruses and scams from your computer and increase your Facebook security. Being the largest social media platform in the world is quite the achievement, but it also comes with quite…

THREAT REMOVAL
Rakhni Trojan image

Rakhni Trojan Removal — Restore Your PC From Infections

The Rakhni Trojan is among the most devastating computer viruses in the last few years combining both a miner and a ransomware engine. It is fairy complex and can evaluate each infected system by running a custom attack sequence. The…

THREAT REMOVAL

RevServicesX (app_loader.exe) BitCoin Miner Virus – How to Remove It

This article has been created to explain what is the app_loader.exe file and what is the RevServicesX BitCoin miner Trojan plus show you how you can remove this threat from your computer completely. A new BitCoin miner malware, going by…

THREAT REMOVAL

All-Radio 4.27 Portable Trojan Removal — How To Restore Your PC

This article has been created in order to explain what is the All-Radio 4.27 Portable Trojan and how to remove this malware completely from your computer. The All-Radio 4.27 Portable Trojan is a dangerous virus instance that is currently being…

THREAT REMOVAL

SocketPlayer Trojan Removal — Restore Your PC From Infections

This article has been created in order to explain what is the SocketPlayer Trojan Trojan and how to remove this malware completely from your computer. The SocketPlayer Trojan is a newly discovered virus that is incorporated into two variants. An…

THREAT REMOVAL

Remove The .IQY Virus & Restore Your PC From Infections

This article has been created in order to help you by explaining to you how to remove the .IQY Virus which can be encountered via email messages. The .IQY virus is a very dangerous malicious threat that incorporates an advanced…

THREAT REMOVAL

Prowli Miner Virus – How to Remove It from Your Computer and Devices

This article has been created in order to help you by explaining how to detect and remove the Prowli malware from your computer system and how to protect it against Prowli in the future. A new malware, going by the…

THREAT REMOVAL

IceID Trojan – How to Remove It and Protect Your Network

This article has been created in order to explain what is the IcedID Trojan and how to remove this malware completely from your computer. The IceID Trojan is an advanced banking Trojan that is being used in large-scale attacks across…

THREAT REMOVAL

Windows Media Center Virus – How to Remove and Stop It

This article has been created in order to help explain what exactly is the Windows Media Center virus and show how you can remove it from your computer completely. A new virus for Windows has been detected by security researchers…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree