Trojans

How to remove Angry stealer trojan

Angry stealer is referring to an information-stealing trojan. The developers are likely based in Russia but the malware is being sold to other cybercriminal groups. It focuses on stealing as much sensitive data as possible from infected devices. It’s a very serious infection that can cause a lot of damage, including lost access to sensitive accounts, financial loss, and identity theft.…

What is the “Redundancies Across The Organization” malicious email

“Redundancies Across The Organization” email is part of a new malicious email campaign that distributes the Agent Tesla RAT (Remote Access Trojan). The email falsely informs the recipient that their employment has been terminated. The email contains a malicious attachment, which users are prompted to open by the sender. If users open it, their computers become infected with a dangerous…

How to remove MrAnon trojan

MrAnon is a dangerous trojan infection. It’s classified as a stealer trojan and infects computers with the intention of stealing all sensitive information from users’ devices. It targets browsers, cryptocurrency wallets, messaging apps, certain file types, etc. The malware is currently for sale.

How to remove DUCKTAIL trojan

DUCKTAIL trojan is a malicious infection used for targeted attacks against prominent Facebook Business pages. Malicious actors use this malware to hijack Facebook Business/Ads pages and steal sensitive data. It’s a serious infection that can cause a lot of damage.

What is the Torpig virus

Torpig Virus refers to a trojan that focuses on stealing personal and corporate data, including bank account information. Referred to as one of the most sophisticated trojans ever created, Torpig has been active since 2005.

Remove Trojan Spyware Alert scam

What is Trojan Spyware Alert scam
Trojan Spyware Alert scam is a tech-support scam that claims a Trojan is installed on your computer and you need to call the shown phone number to get technical support. The reason this and similar scams are called tech-support scams is because they display phone numbers that connect to professional scammers who pretend to be legitimate…

Remove Appmodule.exe Trojan

What is appmodule.exe
appmodule.exe seems to be associated with a cryptocurrency mining trojan. Cryptocurrency miners are trojan infections that use computers’ resources to mine for cryptocurrency like Bitcoin and Monero. These infections don’t do long-term damage to the computer but are very disruptive while installed. The trojan’s extensive usage of computer’s resources means that the computer will run much slower than…

Cerberus Banking Trojan

What is Cerberus?
Cerberus is a banking Trojan designed specifically for Androids and sold on various hacker forums. Like any other banking Trojan, it is used to steal personal and financial information. The threat first appeared in 2019. It gives cyber crooks remote access to the device and allows them to perform different malign actions including sensitive data collection. This data is…

How to remove e.tre456_worm_Windows

What is e.tre456_worm_Windows
e.tre456_worm_Windows is a fake Windows infection that scammers use to trick users into installing questionable software. The way the scam works is pretty simple. Users get redirected to a website that imitates the official Windows’s one and get a pop-up that claims their computers are infected with a trojan virus called e.tre456_worm_Windows. To further scare users, the scam…

What is Win32:Evo-gen

What is Win32:Evo-gen?
Win32:Evo-gen is a detection name used by anti-virus Avast to identify trojans and files with trojan features. Avast anti-virus looks for particular behaviour that resembles that of a trojan or some other kind of malware, and uses the Win32:Evo-gen detection name to identify it. Thus, if your Avast anti-virus is detecting something by that name, there is something…