LockyLocker Ransomware is a dangerous virus that encodes user data for blackmail purposes. Hackers use spam emails with malicious attachments to spread LockyLocker Ransomware. Once it creeps into system, LockyLocker urgently launches encryption process in stealth mode, the culmination of which will be the loss of data.
Cobalten.com is ad-injection software responsible for unwanted redirects and intrusive pop-up ads in your browser. An adware usually sneaks into system together with freeware programs downloaded from the Web. Once it gets on PC, it starts making changes to the browser configuration without user’s agreement in order to force your browser to open http://cobalten.com/… periodically.
Barracuda Ransomware is another crypto-virus from Scarab family that makes user’s data unavailable. Cybercriminals from Scarab have already released many similar viruses and they are all almost identical. It spreads via fake emails containing malicious files and the infection process starts when the user opens it.
Mac Tonic is a rogue software which supposedly is able to detect and fix system errors on Mac computer. The first sign that should be a matter of concern to users is a distribution method. It might get on your PC without being noticed together with some freeware programs you’ve downloaded from the Web.
XiaoBa 2.0 is a new ransomware-virus that encrypts users’ data to make victims pay them. Today, the amount of ransom is 0.5 BTC (~$3969.99). To gain access to the user’s computer, cybercriminals use emails containing malicious files or links to the phishing sites. Following infiltration, XiaoBa 2.0 Ransomware immediately starts infecting targeted data, as a result of which, all your personal files become encrypted.
S.zlsite.com is a deceptive search site that may take place of your browser’s homepage as a result of infection with the browser hijacker. Apart from changing homepage, it generates advertisements, creates new tab as well as redirect user to ad sites. As you probably guessed, browser hijacker is used for advertising purposes.
Combo Ransomware is yet another crypto-malware from same people who are responsible for the creation of infamous Dharma Ransomware. Malefactors spread virus through the deceptive spam emails and shady websites containing malicious scripts. Following infiltration, Combo Ransomware starts encoding users’ data without delay, as a result of which, all your personal files become unavailable.
Thunder Ransomware is a type of malware aimed at encrypting user data. Cybercriminals mainly spread Thunder via spam emails under the guise of payment documents like bank accounts, taxes and so on. Following infiltration, it immediately starts to encode users’ files.
Search.genieosearch.com is a forged search engine that may come up in your browser as a result of exposure to browser hijacker. Browser hijacker is a type of malware that often creeps into the system together with shady free programs and which is primarily used to get advertising revenue. Following the installation, it changes the user’s browser homepage to a page with ads and prevents the user from changing it.