malware

Tue
13
Mar
John Lister's picture

Infected Routers Spread Malware, Log Keystrokes

A security firm says malware that targets routers is so sophisticated it's highly likely a government is behind it. Dubbed "Slingshot," the malware appears to have been working for six years without detection. The attack was on a specific brand of ... routers, namely Mikrotik. Although based in Latvia, its products have shipped around the world to business and home users. The big problem was with an associated piece of software named Winbox, used to manage the router. The way Winbox works involves taking DLL files stored on the router itself and running them directly in the computer's ... (view more)

Wed
21
Feb
John Lister's picture

Microsoft Details Anti-Malware Cloud-Based System

Microsoft says it used artificial intelligence to not only spot and identify and attempted malware attack, but to block it more than a thousand times in the next half hour. It says the defense was possible thanks to Windows Defender being used ... locally on the victim's computer, as well analyzing the snippet of code using cloud-based antimalware. The company calls it an example of machine learning. This means computers are able to figure things out for themselves, rather than simply following 'true or false' routines that are part of a program. Similar to antivirus, the most basic level of anti ... (view more)

Wed
17
Jan
John Lister's picture

New Android Malware Most Powerful Yet

A newly discovered malware exploit offers hackers an incredible level of control and access. Fortunately the creators appear to be highly targeting their victims, though it's still a threat to ordinary users. Dubbed Skygofree, the malware affects ... users of the Android smartphone operating system. It is said to give the people behind the malware the ability to remotely carry out 48 different operations on an infected phone. These include targeted controls not previously seen, as well as more common malware exploitations. Some of the 'normal' options for the malware creators include the ability ... (view more)

Wed
13
Sep
John Lister's picture

Billions of Bluetooth Devices at Risk of Malware Infection

The majority of Bluetooth devices could be vulnerable to a malware attack. The attack, dubbed BlueBorne, can reportedly spread to devices without needing any action from the victim. The attack takes advantage of a bug in the Bluetooth technology ... itself rather than a specific operating system. At one point this summer an estimated 5.3 billion devices were at risk, running Windows, Android or Linux, as well as Apple devices running systems before the current iOS 10. Fixing the problem will require patches for specific devices and operating systems. Microsoft has patched the issue already, ... (view more)

Wed
23
Aug
John Lister's picture

New Malware uses PC Power to Make Cash

Hackers could use your computer to literally make money. That's thanks to an unusual malware attack that doesn't involve any files, making it harder to detect. The "Coinminer malware" takes advantage of a Windows and browser bug nicknamed Eternal ... Blue. That's the same bug that was exploited in several high-profile ransomware attacks recently . While Microsoft has issued updates, it seems some users haven't installed the security patches. Malware Runs Inside Memory One big problem with the Coinminer malware is that it works in the computer's memory, rather than as ... (view more)

Mon
21
Aug
Dennis Faas's picture

How to Fix: Remove Smart System Care Malware (Scam)

Infopackets Reader John B. writes: " Dear Dennis, I am running Windows 10 and every once in a while I receive a popup notification from ' Smart System Care ' that I have errors on my PC and I need to remove them. It then says that if I want to ... remove the problem I have to pay money. I realize this program is most likely a scam, and I tried to remove it from my system but it is nowhere to be found. I have researched the problem using Google however there are so many posts and many steps, and it seems very convoluted. Can you please help? " My response: I asked John if he would like me to ... (view more)

Fri
11
Aug
Dennis Faas's picture

How to Fix: Remove CPX, SVCVMX and CT.EXE Malware (SmartService Rootkit)

Infopackets Reader Priscilla writes: " Dear Dennis, I am running Windows 10 and my computer seems to be infected with a rootkit from what I read online. In Task Manager's Startup , I have the following programs running: cpx.exe , svcvmx.exe , and ... ct.exe . I have tried to disabled these from startup but I get 'Access denied'. I have tried to download Malwarebytes Antimalware to scan the computer but the setup file simply won't run. I have tried downloading other antivirus programs but Edge reports that the file is corrupt. I have tried resetting Windows 10 but it fails and tells me I cannot ... (view more)

Mon
31
Jul
Dennis Faas's picture

How to Fix: Remove SystemTask.exe / SystemTaskInfo.exe Virus (100% CPU Usage)

Infopackets Reader Michael B. writes: " Dear Dennis, Thank you so much for helping me to patch my Windows 2003 Server against the SMB attacks and for removing Windows_Update.exe virus a few weeks back . A have yet another problem that is causing ... high CPU usage! In Task Manager of Windows Server 2003, I see two processes that are eating 50% of my CPU each, namely: SystemTask.exe and SystemTaskInfo.exe . If I try and delete either process, it simply comes back and starts eating my CPU again, which makes everything else on the server painfully slow. Can you please help? " My response: I asked ... (view more)

Tue
04
Jul
John Lister's picture

Windows 10 Gets Anti-Ransomware Feature

Microsoft is adding a new feature to Windows 10 that could make it harder for ransomware to lock up files. It could be useful, but is certainly not a complete defense. The feature, called "Controlled Folder Access," is part of the Windows Defender ... security tool and is already being tested by users who've volunteered for advanced access to Windows 10 updates. The idea is that specific folders can be protected which means that only specified applications or programs can create, alter or delete files in those folders. This includes encrypting the files, which is the key tactic ... (view more)

Mon
26
Jun
Dennis Faas's picture

How to Fix: Remove Update_Windows.exe / Update.exe Virus (100% CPU Usage)

Infopackets Reader Mike B. writes: " Dear Dennis, I run a Windows Server 2003 box that has been fine until two days ago. Now, my CPU usage is 100% with multiple 'Update_Windows.exe' processes running. I've deleted the Update_Windows.exe tasks in ... Task Manager, but it keeps propagating. I did a virus scan, but it did not find anything; Malwarebytes antimalware also is not reporting anything. Prior to the infection, I installed the emergency May 2017 update to avoid the Windows SMB exploit / WannaCry ransomware infection . I understand Windows Server 2003 is no longer supported by Microsoft and ... (view more)

Pages

Subscribe to RSS - malware