Threat Encyclopedia

Welcome to the Threat Encyclopedia. Want to know about most modern malware and how to remove them? Why are unwanted applications dangerous? What are backdoors and trojan viruses and how do cybercriminals exploit them? The answers to these and other questions are right here.

Ransomware Ransomware is a type of malware that encrypts a victim’s files or entire system, rendering them inaccessible. Attackers demand a ransom payment in exchange for a decryption key to restore access.
Trojan Horse Trojan horses are disguised as legitimate software but contain malicious code. They often trick users into downloading and installing them, allowing attackers to gain unauthorized access to the victim’s system.
Spyware Spyware secretly collects information about a user’s online activities, keystrokes, and personal data. It’s often used for stealing sensitive information or monitoring user behavior.
Worms Worms are self-replicating malware that spreads without human intervention. They exploit vulnerabilities in computer systems and networks to propagate, causing widespread infections.
Botnets Botnets are networks of compromised computers (bots) controlled by a single entity. They are used to perform various malicious activities, such as launching DDoS attacks or distributing spam.
Adware Adware displays unwanted advertisements to users. While not always inherently malicious, aggressive adware can negatively impact user experience and compromise privacy.
Keyloggers Keyloggers record keystrokes on a victim’s device, allowing attackers to capture sensitive information like passwords, credit card numbers, and personal messages.
Unwanted Applications Unwanted applications are software programs that are often bundled with legitimate software downloads. They may lead to undesirable behaviors, such as displaying ads, collecting user data, or changing browser settings.
Browser Hijacker Browser hijackers modify browser settings without the user’s consent. They redirect users to malicious websites or unwanted search engines, causing inconvenience and potential security risks.
Coin Miners Coin miners, also known as cryptojacking malware, use the victim’s computer resources to mine cryptocurrencies without their knowledge. This can slow down the system and lead to increased energy consumption.
Backdoor Backdoors are hidden entry points created by attackers to gain unauthorized access to a system. They allow attackers to control the compromised system, steal data, or launch further attacks.

Here you will find numerous articles about common threats, a general classification of malware, and unwanted applications.

German Japanese Spanish Portuguese (Brazil) French Turkish Chinese (Traditional) Korean Indonesian Hindi Italian

Ransomware

LKFR Virus File

The Lkfr virus, a type of ransomware from the STOP/DJVU family, is notorious for its harmful file encryption. It invades systems to encrypt various file types, including documents, videos, and photos. Each affected file is...

Spyware

Solan Stealer Malware Removal Guide

Solan is a potent Python-based malware, that uses a wide range of spreading methods to propagate itself into the system. These include malicious downloads, deceptive links, and infected email attachments. Once inside, it...

BlazeStealer Malware Removal

BlazeStealer is a data-stealing malware that primarily targets browsing and financial information. It distincts for its extremely low price and spreading from a clear web page. BlazeStealer stealer features anti-analysis measures...

Malware

Trojan.Gen.MBT Symantec Trojan Virus

Trojan.Gen.MBT is a generic detection name used by Symantec antivirus to identify a potential Trojan or malware threat on a computer. The “Gen” in the name indicates that it is a generic detection, meaning that the...

Unwanted Applications

PUA:Win32/Cafcon PUA Virus (Cafcon Removal)

The PUA:Win32/Cafcon notification means that your system has a problem. Giving it a go may lead to some really bad consequences. Unwanted programs are not as dangerous as regular viruses, but still can create a mess in your...

PUA:Win32/Coupish PUA Virus (Coupish Removal)

The PUA:Win32/Coupish detection means that your PC has a problem. Giving it a go may lead to some really bad consequences. Unwanted apps are not as outright dangerous as regular viruses, but is still able to create a mess in your...

Browser Hijacker

🥺 How to remove Humisnee pop-ups?

Humisnee.com pop-up can appear out of the blue, covering the post of the website you checked or opening your web browser when you do not need it to be opened. Clicking the Humisnee advertisement may cause the injection of various...

Backdoor

Coin Miners