PC Manpower

Tonbridge and Malling Tel: 01732 790099 | Medway Tel: 01634 505051

Viruse, Malware and Malicious Software

To clarify what kind of infection your computer has and how you might deal with it, read on.
You simply want to know how to remove it and stop it happening again. Go here for future prevention.

 

 

 

Virus, Malware, Spyware & other Malicious Programs infecting your computer

Ransomware:  Don’t be fooled by these scams!

Popups filling your screen? – getting popups on your screen is a serious problem. If pop-ups are coming at you when your browser isn’t even open, it’s likely you have a virus, malware or malicious software. More worrying if the pop-ups advertise amazing cure-all to your “virus troubles”
Messages you did not send – Most viruses have one goal in mind that is to infect your email client and post its self to all your friends while under the guise of someone else in your contacts (to mask its tracks).
These mail viruses & messages can show up anywhere, usually draging spyware and malware too. These viruses might try to send out spam through your email account. It could take control of your Facebook. In almost all cases, it will include a link or attachment to the virus somewhere in the post.
Keep an eye on your email’s “sent” folder and on your social network posts. If you notice these posts, it’s likely that you’ve been hacked and a virus could be behind it
you’re locked out of your PC – You restart your PC only to be presented with a page telling you that your PC is frozen until you pay to have the lock removed. It may claim to be from law enforcement or an anonymous blackmailer.
The page is lying. What’s really happening is that a virus has blocked off your computer’s most important features. The scam is trying to make you cough up some money to get your computer back. This is called “ransomware”,  you would not be wrong terming this as either virus, malware or Scareware. PC Manpower can help you with virus removal, we are specialists in this field and cover most of Medway and West Malling area.

TIP:  Try reseting your web browser. You can find  step by step guide here for Internet Explorer Click Here

Virus Malware - AKA Ukash-Virus
Malware hijacker. AKA Ransomeware

 

Trying to goto a webpage but get something different? Browser hijacking occurs when you find that your web browsers settings have been changed without your permission. This could occur if some malicious software takes control of your computer including the browser and changes its settings, without your concent.

So what does it do?

  1. Your home page is changed
  2. Default search engine is changed
  3. You can’t navigate to certain web pages like home pages for anti virus
  4. You get re-directed to pages you never asked for
  5. You see ads or pop ups on your screen.
  6. You see new toolbars added
  7. Your web browser starts running slowly.

TIP:  Try reseting your web browser. You can find  step by step guide here for Internet Explorer Click Here

 

This is the sign of a Browser Hijacker.  If your browser start like the image below, you may have a hijacker.

Important Note: If you think your browser should start with Google as the home page, then the title at the top should look similar to this  https://www.google.co.uk  or  https://www.google.com

 Anvisoft state that the image below (Home.tb.ask.com and Search.tb.ask.com) are classified as browser hijackers

InboxAce-Toolbar
Malware, hijacker inbox toolbar virus

 

Getting mail from friends telling you that you are sending SPAM mail to everyone? You may have a worm, not a virus as such but a malicious code that self-replicates using mediums like your email account. Some of these can be VERY cunning and mask themselves as someone in your address book or contacts. Worms are usually reliant on Trojans, Viruses or Bots to transport themselves into other systems. Generally, if you have a worm, then it may well have an accomplice.

Want to see more, not quite what you have? maybe you have a conduit hijacker. Click here for our Conduit page

Malicious Software List

In this section for virus, malware and other infections, you may find it useful to familiarize yourself with some of the terminology and discriptions.

Trojan

The most common type of infection! Just being on the internet, and Bang it’s in, no hello or anything. Choosing Firefox or Internet Explorer over other browsers will not help. Don’t be fooled into thinking that a FREE anti-virus will protect you ‘much’ or that if you only visit clean sites you are safe, you’re not. Unfortunately, for a lot of us there is a kind of cognitive disconnect, in that the reality of virus infection and the perceived idea of it differ greatly.

Botnets

Symptomless infection of multiple computer systems by a malicious program whose sole purpose is to infect and control other systems with Spam or extract bank information. Upon investigation of who the culprit is leads to another infected drone computer system working in tandem with other ‘owned’ computers.

Scareware

One of the most pervasive malicious element of infiltrations out today. This beauty tells you, you’re infected and prompts you to act. Knowing what you most likely will do, Scareware will probably populate your screen with menus or messages purporting to be from Microsoft or your anti-virus software. Clicking anywhere will install its payload.

Spyware

Mostly asymptomatic in its position juxtaposed alongside ‘cookies’ or ‘toolbars’ its sole intention is to harvest either simple surfing habits or retrieve shopping and personal details. This may be apparent when similar pages turn up in your browser, but not the ones you may have hoped for. You may receive emails with offers related to web searches you have performed.

Browser Hijacker

Often this may reveal itself by way of popups related to things previously searched for on auction sites, and catalogue sites, amazon for example, as well as general searches. The browser may divert you to sites that the hijacker originator has a vested interest in. One thing to point out here is that some sites you are redirected to are not in themselves criminal or intended criminal activists. What is happening is that somewhere along the line middle men in grey suites have sold the service of directing traffic to the customer’s site. They, the middle men that is, may tread a grey line or perhaps not ask too many questions of their suppliers.
Without pointing fingers here, as an example, you may visit a particular auction site and notice adverts on the site, some adverts may be designed to look more like a directive from the trusted site, or perhaps part of your own windows system. It may tell you to install the NEW communicator software for messaging. Obviously many may take this to be a trusted directive and without question, simply install it. Here is where it gets very grey and then very dark. You notice a new task bar on your browser and think little of it but active-x components (for Internet Explorer) have begun to realign your search parameters in accord with the new taskbar. Moreover, this is directly related to another search redirector which has snuggled neatly in as your default search provider. Congratulations are in order, as this install may have happened a day or two before and the ads on the auction site have changed leaving you wondering if the Hijacker actually came from there or was it already in your system. Time is a great healer, but sometimes not for us.

Malware

This usually covers Virus and Trojans, though it more often assumed to be Hijackers or popup related. ‘Malware’ is in fact the acronym of ‘Malicious software’ so it is safe to say ‘all of the above’

 Worm

This is actually not a virus, but rather, a Malware. It does not need to attach itself to files. Instead it spreads by replication through poorly guarded networks.

Virus

This formidable title actually has metamorphorsized into several varieties of virus, each distinct from the other.

1. Polymorphic Virus – Ever changing it own code, evasive encryption tactics aiding in payload delivery
2. Resident Virus – Sits in memory, if you delete the file it re inserts itself infecting other files
3. Hybrid or Multipartite Virus – infecting using a multi-pronged attack. System files and boot sector at the same or different times.
4. Web Script Virus – infecting via code, i.e. Java script on webpages or PHP code through websites
5. Macro Virus – If you use Microsoft Office for example, macro viruses are small pieces of code that run in embedded code within documents. Could run many different types of attack
6. File infector Virus – Takes root in the file. Once activated it will then infect one or more files in pursuit of it goal. Usually overwrites target file mascaraing as the victim.
7. Direct Action Virus – just does one thing, once its task is implemented it ends and is dormant.

If you have any questions related to virus, malware or other malicious programs, give us a call, and one of our technitions will be happy to discuss a repair plan.

NOD32-Consumer