Scylex Banking Trojan – Removal and Protection - How to, Technology and PC Security Forum |

Scylex Banking Trojan – Removal and Protection

shutterstock_223094779Malware researchers have discovered a new banking Trojan, dubbed by the weird name Scylex. It has been advertised at this present moment on the DarkWeb forums, but the malware has not yet been seen in action. Scylex is reported by Heimdal researchers to be advertised as a new form of threat that is created with a code like no other on the web, which is particularly dangerous, because if this virus is already released it may have caused numerous infections on institutions worldwide.

For those who are not familiar, banking Trojans, like Scylex exhibit a botnet-like behavior in combination with information stealing mechanisms to steal financial details from infected computers.

Threat Summary



TypeBanking Trojan
Short DescriptionThe Scrylex trojan steals financial information from compromised computers.
SymptomsPhishing pages, unfamiliar processes, weird behavior on system startup.
Distribution MethodVia an Exploit kit, JavaScript, other malware or PUPs., rootkit.
Detection Tool See If Your System Has Been Affected by Scylex


Malware Removal Tool

User ExperienceJoin our forum to Discuss Scylex Banking Trojan.

Scylex – Potential Ways of Distribution

There are several methods by which Scylex banking Trojan can spread all over the web. One of these methods is by spam e-mail. The malware may exist uploaded online in malicious URLs that can be posted in the body of the e-mail, like the example picture below:


It may also exist in malicious e-mail attachments that can cause PC infection by having users download and open them by themselves on their computers, believing they are legitimate documents, like PDF or Microsoft Office files.

Scylex – More Information About it

Experts at Heimdal Security and CSIS Security Group have also discovered that the price of Scylex on the dark web is not a small one. The virus starts with the basics at $7,500. Ever since the Zeus project has been released, most banking Trojans have taken its source code and modified it to sell cloned malware on the deep web.

This is why, experts at Softpedia believe that the people behind Scylex banking Trojan use this fact as a marketing tool to advertise a virus that is completely new and has nothing to do with clones that may be detected more by antivirus software.

The kit, sold by the cyber-criminals in the deep web is not limited to the malware piece itself. It also involves a rootkit malware, data stealers from online forums and also injectors. For additional security, experts report that this virus also includes a special proxy which can operate even when the connection is very slow and the user does not have an administrator access on the affected computer.

Not only this, but If the one who buys the malware wishes to pay extra, they should receive a free “customer support” to use such proxies, according to researchers.

There were also other features of this virus that have been reported to exist, like the newly seen feature for Trojans to use Virtual Networks, giving the cyber-criminal customers extra security by allowing them to infect computers from virtual machines.

Scylex Trojan has the capability to include limitless features in it as well. The blackhats behind it also promise to include other modules in the virus:

  • Powerful “Spreading” features.
  • Compatibility with Microsoft Edge and Opera web browsers.
  • Financial transaction support features.

Scylex Banking Trojan – Conclusion, Removal and Protection

The cyber-criminals behind Scylex Trojan are also reported to be working on other malware as well. Softpedia researchers report that they are also developing a powerful DDoS tools. With having everything saved online nowadays, malware analysts are concerned that malware has become a lucrative business for those who wish to use it for profit via cyber-crime. This is why they strongly advise users to have the necessary protection against it at all times.

We advise checking for Scylex banking trojan by using the instructions below and scanning it with an advanced anti-malware software, which will also help you stay protected in the future as well with its real-time shield.

Automatically remove Scylex by downloading an advanced anti-malware program

1. Remove Scylex with SpyHunter Anti-Malware Tool

Remove Scylex with SpyHunter Anti-Malware Tool

1. Install SpyHunter to scan for and remove Scylex.2. Scan with SpyHunter to Detect and Remove Scylex.
Step 1:Click on the “Download” button to proceed to SpyHunter’s download page.

It is highly recommended to run a scan before purchasing the full version of the software to make sure that the current version of the malware can be detected by SpyHunter.

Step 2: Guide yourself by the download instructions provided for each browser.
Step 3: After you have installed SpyHunter, wait for it to automatically update.


Step1: After the update process has finished, click on the ‘Scan Computer Now’ button.
Step2: After SpyHunter has finished scanning your PC for any Scylex files, click on the ‘Fix Threats’ button to remove them automatically and permanently.
Step3: Once the intrusions on your PC have been removed, it is highly recommended to restart it.

2. Back up your data to secure it against infections and file encryption by Scylex in the future

Back up your data to secure it against attacks in the future

IMPORTANT! Before reading the Windows backup instructions, we highly recommend to back up your data automatically with cloud backup and insure it against any type of data loss on your device, even the most severe. We recommend reading more about and downloading SOS Online Backup .

To back up your files via Windows and prevent any future intrusions, follow these instructions:

1. For Windows 7 and earlier 1. For Windows 8, 8.1 and 10 1. Enabling the Windows Defense Feature (Previous Versions)

1-Click on Windows Start Menu
2-Type Backup And Restore
3-Open it and click on Set Up Backup
4-A window will appear asking you where to set up backup. You should have a flash drive or an external hard drive. Mark it by clicking on it with your mouse then click on Next.
5-On the next window, the system will ask you what do you want to backup. Choose the ‘Let Me Choose’ option and then click on Next.
6-Click on ‘Save settings and run backup’ on the next window in order to protect your files from possible attacks by Scylex.

1-Press Windows button + R
2-In the window type ‘filehistory’ and press Enter
3-A File History window will appear. Click on ‘Configure file history settings’
4-The configuration menu for File History will appear. Click on ‘Turn On’. After its on, click on Select Drive in order to select the backup drive. It is recommended to choose an external HDD, SSD or a USB stick whose memory capacity is corresponding to the size of the files you want to backup.
5-Select the drive then click on ‘Ok’ in order to set up file backup and protect yourself from Scylex.

1- Press Windows button + R keys.
2- A run windows should appear. In it type ‘sysdm.cpl’ and then click on Run.
3- A System Properties windows should appear. In it choose System Protection.
5- Click on Turn on system protection and select the size on the hard disk you want to utilize for system protection.
6- Click on Ok and you should see an indication in Protection settings that the protection from Scylex is on.
Restoring a file via Windows Defense feature:
1-Right-click on the encrypted file, then choose Properties.
2-Click on the Previous Versions tab and then mark the last version of the file.
3-Click on Apply and Ok and the file encrypted by Scylex should be restored.

3. Restore files encrypted by Scylex

Restore Files Encrypted by Scylex

Security engineers strongly advise users NOT to pay the ransom money and attempt restoring the files using other methods. Here are several suggestions:

To restore your data, your first bet is to check again for shadow copies in Windows using this software:

Shadow Explorer

If this method does not work, Kaspersky have provided a decryptors for files encrypted with the this and other encryption algorithms:

Kaspersky Decryptors

Another method of restoring your files is by trying to bring back your files via data recovery software. Here are some examples of data recovery programs:

There is also the technical option to use a network sniffer:

Another way to decrypt the files is by using a Network Sniffer to get the encryption key, while files are encrypted on your system. A Network Sniffer is a program and/or device monitoring data traveling over a network, such as its internet traffic and internet packets. If you have a sniffer set before the attack happened you might get information about the decryption key.

Optional: Using Alternative Anti-Malware Tools

Remove Scylex Using Other Alternative Tools

STOPZilla Anti Malware
1. Download and Install STOPZilla Anti-malware to Scan for And Remove Scylex.
Step 1: Download STOPZilla by clicking here.
Step 2: A pop-up window will appear. Click on the ‘Save File’ button. If it does not, click on the Download button and save it afterwards.
Step 3: After you have downloaded the setup, simply open it.
Step 4: The installer should appear. Click on the ‘Next’ button.
Step 5: Check the ‘I accept the agreement’ check circle if not checked if you accept it and click the ‘Next’ button once again.
Step 6: Review and click on the ‘Install’ button.
Step 7: After the installation process has completed click on the ‘Finish’ button.

2. Scan your PC with STOPZilla Anti Malware to remove all Scylex associated files completely.
Step 1: Launch STOPZilla if you haven’t launched it after install.
Step 2: Wait for the software to automatically scan and then click on the ‘Repair Now’ button. If it does not scan automatically, click on the ‘Scan Now’ button.
Step 3: After the removal of all threats and associated objects, you should Restart your PC.


Ventsislav Krastev

Ventsislav has been covering the latest malware, software and newest tech developments at SensorsTechForum for 3 years now. He started out as a network administrator. Having graduated Marketing as well, Ventsislav also has passion for discovery of new shifts and innovations in cybersecurity that become game changers. After studying Value Chain Management and then Network Administration, he found his passion within cybersecrurity and is a strong believer in basic education of every user towards online safety.

More Posts - Website

Follow Me:

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Share on Twitter Tweet
Share on Google Plus Share
Share on Linkedin Share
Share on Digg Share
Share on Reddit Share
Share on Stumbleupon Share