Things to consider before using Wikibuy

Wikibuy is an extension which offers cheaper alternatives to your purchases

If you are looking for a shopping assistant, WikiBbuy may have caught your eyes. This Google Chrome browser add-on is a quite popular tool that helps to save money when shopping online.

Wikibuy is a comparison service which looks up the internet for a better deal for you. For example, if you are looking for a sofa on Amazon, the pop-up shows you a better deal somewhere else. Additionally, Wikibuy searches for coupons and offers that might be offered online by the original retailer and presents them to you to apply.

Developers of this shopping assistant also thought of other useful features, such as Wikibuy Checkouts which allows purchasing in different e-shops without having to log in to their accounts, filling forms and letting retailers know your personal information.

Moreover, users are offered order tracking feature, money back guarantee and loyalty rewards. All of these features are not unique. However, this basic functionality allows trusting the developers and trying their free application.

The service is free, and the developers generate revenue whenever a customer chooses the item suggested via Wikibuy extension. Therefore, you will not find this extension causing intrusive ads or redirects. However, users report about this extension is not as good as promised.

Downside of Wikibuy: doing your research might help to save more money

Wikibuy developers claim to have over 1 million happy customers. However, the reviews and comments online reveal that not all users are very pleased with this Chrome extension. Among negative opinions are:

  • the add-on does not tell where you can get the same goods for the lowest price;
  • longer shipping time compared to buying directly from buying directly from specific e-shops;
  • data tracking and sharing that might put user’s privacy at risk.

According to some users, developers of the add-on are not genuine. This shopping assistant does not provide the lowest price in the market. Some reports tell that doing your researcher helps to save more money than relying on Wikibuy.

The latter situation seems to be related to developer’s participation in affiliate marketing programs. It means that they get revenue if Wikibuy users buy a specific “low-priced” product. This activity makes developers look untrustworthy.

Another serious problem with Wikibuy is that it keeps a whole bunch of personal and non-personal information. According to the Privacy Policy, the following information is tracked and recorded:

  • User-provided information;
  • Cookies and automatically collected information;
  • Location information;
  • Third-party web beacons and third party buttons;
  • Information from other sources;
  • Payment information;
  • Transaction data.

What is more, aggregated details might be shared with affiliates. As a result, you might start noticing a bunch of ads based on your recently search items or bought products. However, interest-based ads might be not only annoying but in some cases dangerous too, for instance, they might redirect to phishing or infected websites.

Things to remember if you decide to install and try Wikibuy

Just like many other programs and browser add-ons, Wikibuy has its pros and cons too. If you are a user who takes his or her privacy seriously, probably you won’t consider installing it to your browser and testing it out.

Otherwise, you might just give this free extension a try. However, if you decide to use it, we want to remind that you should be careful. First of all, make sure that you are installing safe and legit Wikibuy extension. For this reason, you have to install it from the official website, Chrome app store or iTunes.

Note that this extension is not compatible with Safari, Mozilla Firefox or Android operating system. Thus, if you find offers to download such versions of Wikibuy, you might be targeted by the cyber criminals.

Additionally, be careful with ads that you notice online. Do not rush to click them. Offers that seem “too good to be true” typically are not real and designed to get your click only. Additionally, if you decide not to show through Wikibuy, make sure that you are not on a phishing website.

Finally, when shopping online, you should always do your research before entering your personal information and paying for the good. All free shopping assistants might have the same problem – their financial wealth might depend on affiliates. Hence, they might not be very honest with you.

Chrome Search browser hijacker and its versions keep actively spreading in the cyberspace virus is nothing more than an impersonator of Google Chrome operates as a fraudulent search directory which is remarkably similar to Google Chrome. In other terms, it aims to imitate this famous search engine to trick users into believing its legitimacy. While there are numerous claims about how this unreliable program respects your privacy, research shows the opposite — it collects private details related to your browsing sessions on purpose.

We want to warn you not to fall into the trap of an attractive description because the authors of Chrome Search explicitly point out that this is the privacy-respecting program. However, if you attentively check the Privacy Policy, its developers state that they save the personal information you provide them despite whether it happened on their request or not. Likewise, you have no guarantees that your private details will not be sold to third-parties or misused in other ways.

Note that any of the browser hijacker versions mentioned below and those still not identified, perform similar or exact activities which might put your privacy and computer security at risk. Therefore, you should remove right away and do not believe in the fraudulent claims about its usefulness.

The activity of Chrome Search and its versions

It is essential to mention that currently, virus is on the rise. Experts have successfully identified Clean My, and as the offsprings of the mother program. Additionally, is the newest variant which has reached the cyberspace at the beginning of December. This rapid development indicates that users should not expect this browser hijacker to stop taking over their browsers.

Furthermore, once the browser hijacker enters the system, it takes over, such popular browsers as Google Chrome, Mozilla Firefox, Internet Explorer, Safari, etc. In other terms, every time you open a new tab/window or click on your homepage, you are redirected to hxxp://

You should not let these browser modifications to slip through since after ChromeSearch hijack happens, its developers gain full access to collect various information which might be misused to deliver annoying and intrusive ads. They look genuine and attractive. Likewise, people are lured into clicking on one after another.

Also, be aware that ChromeSearch redirect is another potentially dangerous action since it might lead you to highly suspicious websites which increase the risk of getting infected with malware. Thus, avoid clicking on any types of advertisements that appear among the query results displayed by this fake search engine.

We highly recommend you to complete removal right after you notice its presence. Note that the easiest way is to employ a professional security software to help you with different and more sophisticated variants of this potentially unwanted program. Do not hesitate and clean your computer from browser hijackers!

Learn how this PUP stealthily enters your system

While you can manually install Chrome Search extension on the Chrome Web Store, you can also unconsciously let it to your computer without notice. Developers of such browser hijackers aim to take advantage of people who are in a rush and infuse the PUP into the installers of free applications.

Likewise, if the user opts to finish the download/installation procedure as soon as possible, he or she picks Quick/Recommended settings which do not show the hidden PUP inside. Thus, we recommend you to pay more attention to this process and choose Advanced/Custom options. It is vital to de-select the marks which have been selected before and allow to install the potentially unwanted program.

Additionally, you should scan your computer afterward and make sure that the security software will perform removal if necessary. This way you will fully protect not only your privacy but computer security as well.


Developers of Zeus Panda virus present new distribution strategy

Zeus Panda virus used SEO to attack users

Security researchers warn about new and clever Zeus Panda virus distribution campaign. Developers of the malicious program used Search Engine Optimization (SEO) for poisoning specific financial and banking-related keywords. In order to succeed, crooks compromised business websites first to rank high in Google search results.

Zeus virus is known since 2017. However, for almost a decade new variants of the malicious program are emerging and trying to steal personal information about users. The Zeus Panda, or Panda Banker, virus has been detected in 2016. However, researchers from Cisco’s Talos reported about new distribution campaign at the beginning of November.

According to the report, criminals used a combination of SEO, compromised legit websites and malicious Word macro commands to install data-stealing malware on victim’s computer. Security researchers tell that malware targeted users of  these banks:

  • Nordea Sweden,
  • the State Bank of India,
  • India’s Bank of Barodia and Axis Bank,
  • the Commonwealth Bank of Australia,
  • Saudi Arabia’s Al Rajhi Bank.

Previously, Panda trojan targeted Australian and British banks. However, the interesting fact is, that malware uses geo-filtering. Once it gets inside the device, it checks computer’s language settings. The virus does not launch its activities if the default language is Russian, Ukrainian, Belarusian or Kazakh.

Criminals sophisticated and well-prepared attack

First of all, the attackers compromised legit business websites in order to rank higher in Google search. Then attackers poisoned specific keywords that were supposed to redirect to corrupted sites. According to the research, criminals managed to show their malicious results several times in Google results page when users entered these keywords:

  • “nordea sweden bank account number”
  • “how many digits in karur vysya bank account number”
  • “free online books for bank clerk exam”
  • “al rajhi bank working hours during ramadan”
  • “how to cancel a cheque commonwealth bank”
  • “free online books for bank clerk exam”
  • “salary slip format in excel with formula free download”
  • “bank of baroda account balance check”
  • “axis bank mobile banking download link”
  • “bank guarantee format mt760”
  • “sbi bank recurring deposit form”

The compromised websites included a malicious JavaScript code to initiate redirects until a macro-enabled document is installed on the system. Once opened, the document asks to enable macros to view the content. Indeed, clicking “Enable Content” button leads to the installation of Zeus Panda virus.

Developers of Panda Trojan used traditional malware distribution methods before

Since the appearance of Zeus Panda malware, authors tried several distribution methods until they came up with the idea to rely on SEO. They spread the trojan via malicious spam emails and three exploit kits – Angler, Nuclear and, Neutrino.

However, the malspam campaigns also included Word document that downloaded malware executable on the system. Other campaigns exploited CVE-2014-1761 and CVE-2012-0158 vulnerabilities to attack media and manufacturing corporations.

Bad Rabbit ransomware: tips to avoid the latest version of Petya

New variant of Petya emerged – Bad Rabbit ransomware virus

On the 24th of October, the new version of Petya ransomware was reported to attack Russian and Ukrainian organizations. Petya is known for attacking Ukraine companies and public sector. However, this time the recently discovered Bad Rabbit ransomware hit harder Russia.

According to the latest information, Bad Rabbit virus attacked Kiev Metro and Odessa International Airport. Even though there’s still not a lot of information about the damaged caused to these infrastructure’s systems, the attack is warning sign to all organizations and companies to make sure that their systems and networks are protected.

Additionally, reminding employees security tips is also recommended. The current version of Petya virus spreads as fake Adobe Flash update. Thus, inexperienced users can be easily tricked into downloading a malicious file and causing serious problems to the whole computer network.

However, security researchers did not take long to find a vaccine to prevent ransomware infiltration. Though, basic security tips are also recommended to follow.

Bad Rabbit malware masquerades as Flash update

Drive-by downloads are one of the distribution methods used for spreading Bad Rabbit ransomware virus. The fake Flash update is injected into compromised websites. If users end up on a malicious site, they receive a pop up asking to install the latest update. Once they hit “Install” button, the malicious executable is dropped to the Win32/Filecoder.D folder. Then the install_flash_player.exe file is executed, malware starts data encryption procedure.

However, malware might also exploit a vulnerability in Windows Server Message Block (SMB). At first, it was thought that malware uses EthernalBlue vulnerability. However, latest analysis data says that it’s not true. Malware just scans the internal network and looks for open SMB shares. If it finds, it might affect the whole network.

Protecting computers and networks from ransomware

Bad Rabbit ransomware might cause extreme damage to your company or paralyze important city infrastructures, such as public transportation. However, home computer users should be aware of security tips too.

After the infiltration, malware immediately locks files with a combination of RSA-2048 and AES-128-CBC encryption ciphers and makes them unable to open due to .encrypted file extension. In order to recover files, victims are asked to pay 0.05 Bitcoin. However, the size of the ransom might increase.

Security researchers discovered a vaccine that helps to protect devices from the latest version of the Petya ransomware:

  1. Create infpub.dat and cscc.dat files in c:\windows directory by running cmd.exe as an administrator and entering these commands:
    echo “” > c:\windows\cscc.dat&&echo “” > c:\windows\infpub.dat
  2. Right-click on each of the newly created files and select Properties.
Access Security tab in the appeared Properties window.
  4. Click Advanced option.
  5. In the newly appeared window click “Change Permissions…” button.
  6. Uncheck “Include inheritable permissions from this object’s parents” box (Windows 10 users have to choose “disable inheritance button” and then select “Remove all inherited permissions from this object”).
  7. You will receive a Windows Security pop up. Click Remove button.

Additionally, security experts do not recommend paying the ransom and advise to take precautions in order to avoid losing important data loss:

  • Enable automatic Adobe Flash Player updates. In this way, you or your employees will not be tricked into installing bogus update from the pop-up window.
  • Patch the Windows SMB protocol. Also, make sure that your operating system has all necessary security fixes. Install them as soon as they are offered by Microsoft.
  • Install available software updates. Enabling automatic software updates help to avoid misleading alerts. However, if you prefer monitoring updates, you should be careful and do not forget to install them regularly.
  • Do not open suspicious email attachments. Often ransomware-type viruses spread via malicious spam emails that include an infected attachment. Before opening any attached safely looking files, please check the information about the sender and provided an issue to make sure that it’s actually safe to open.
  • Backup data and update it regularly. Having extra copies of the most important files reduces the damage in case of ransomware attack.
  • Strengthen computer’s protection by installing reputable antivirus.

Cybercrime trends Fall 2017: what cyber threats can you meet online?

Be aware of ransomware: your files are still in danger

Recently, Europol announced that ransomware is the most powerful cyber threat among all. Thus, this autumn user should be prepared for data-encrypting virus attacks. One of these threats is a new version of Locky; and we are not talking about Lukitus and Ykcol variants.

In October 2017, researchers discovered Asasin – a new example of Locky that spreads via corrupted email attachments. If it finds the way into the computer, there’s no way to get back your files.

The BTCWare family also continues to grow up. At the beginning of October, BTCWare PayDay ransomware version has been noticed spreading and asking to pay the ransom. Thus, it’s time to backup to avoid possible damage.

Facebook scammers allure victims with free iPhone X

Virtual life on the biggest social network is not simple and calm. The new wave of Facebook virus spread a scam aiming at Apple fans and those who are in desperate need to get the latest iPhone model for free.

Numerous fake pages were created on Facebook and Instagram to attract users to participate in iPhone’s giveaway. Undoubtedly, no one is going to give free Apple phones. The purpose of this scam is to collect a bunch of sensitive information about users. In order to participate in such contest, people are asked to verify their Facebook accounts, enter the full name or contact details.

Scam posts might also redirect to suspicious pages and shows numerous ads. Therefore, naive users can end up on a malicious website until he or she ends up on a phishing site. Thus, this autumn you should not forget that too-good-to-be-true offers are always created by criminals.

Malvertising attacks become bigger and more sophisticated

It seems that malvertising became a new sweet spot for cyber criminals. This autumn crooks launched two massive campaigns to spread malware-laden ads. At the beginning of October, the legit Taboola advertising platform was hacked.

Malicious Taboola ads were noticed on website. They redirected to a tech support scam website that warned about “harmful virus” and asked to call a toll-free phone number to Microsoft technicians. Indeed, there’s nothing unique about this scam example.

Later KovCoreG group showed that they are capable of hacking another legit ad-services. This hackers team aimed at one of the most popular and most visited websites – Pornhub. However, this time criminals used a sophisticated attack which targeted users by their location and used browser.

People from the US, Canada, the UK and Australia who visited this porn site using Chrome or Firefox were asked to install a critical update. Meanwhile, Microsoft Edge and Internet Explorer users were tricked by fake Adobe Flash Player update. In this way, cyber criminals tricked millions of users to install Kovter click fraud adware. Thus, being careful with ads this fall is more than important.

Ominuous update: Locky now encrypts data as Yckol virus

Locky remains to be a major issue in the cyber space

Perhaps Locky developers ran out of crafty ideas as they ceased making up intriguing names for their malware. After Diablo6 and Lukitus versions were released, the crooks launched a supposedly new version with a brand new name – Ykcol – which is Locky backward.

Any new features?

The latest version does not manifest any exceptional prowess. Besides the alternations in the name, the source code does not seem to have been changed drastically. Nonetheless, there are slight amendments in the distribution campaign.

The menace continues relying on the Necurs botnet which delivers thousands of spam emails worldwide. Since the introduction of Diablo6 and Lukitus extensions, a change in the employed folder type was spotted as well.

Earlier versions of ransomware tended to hide in a .rar folder, but latest editions, including Ykcol, are placed in .7z folder. It contains a VBS script which activates the execution of the file-encrypting threat.

Locky developers retained the habit of disguising the malware in invoice emails. Previous editions were delivered along with a brief message “Files attached. Thanks”. Ykcol tends to fish for gullible users with “Could you please let me know the status of the attached invoice? I appreciate your help!” messages. An alternative sample of the menace tries to persuade potential victims to launch the virus by disguising under the name of Herbalife Nutrition company, which is the nutrition and weight management company located in the US.

From invoices to fake verification emails

While the attention is concentrated on Ykcol ransomware, Lukitus and Diablo6 crypto-viruses should not be ignored as well. Recent analysis reveals that the racketeers disguise the malware under fake Dropbox account verification emails.

In addition, company employees should be especially vigilant about Locky. There have been versions detected which include counterfeited scanned .png images. They are called as scanned printer images.

The problem is that Locky targets company servers. Consequently, it can easily foist such message. Unsuspecting users, thinking that the email was sent by a colleague, might open the corrupted version only to find out Ykcol or Lukitus encrypting their files afterward.

However, though the developers of this menace seem to use conservatives techniques, Locky still remains undecryptable.
Considering prevention means, attentiveness and cyber security are the key factors in warding off Locky:

  • install system updates once they are published
  • update security tools
  • use a couple of different type anti-malware apps
  • double-check the sender of a received suspicious email
Cerber and Locky viruses strike again

Hacking in summer time – Locky and Cerber developers start another distribution campaign

Cerber or Locky – ever-evolving and ever-lasting cyber issues

In case you started wondering whether, by any chance, the notorious two ransomware giants got finally terminated, we are sorry to disappoint you. It seems that the developers of these two threats have wisely spent the summer time: improved viruses target netizens again. What’s new and what should you beware of?

Cerber now sniffs for personal data

Corresponding to its original name – the mythical creature Cerber – the developers decided to add data-stealing features. Now the latest version of the virus, which is distributed as CRBR Encryptor, is able to capture browser passwords and bitcoin wallet-related information.
Besides looking for Chrome, Internet Explorer, Firefox and other browser passcodes, the infection also attempts to steal Bitcoin Core wallet, Multibit and Electrum wallet information.

IT specialists suspect that the source code enabling the mentioned function might belong to another project. Though this new update certainly makes the malware even more menacing, data stealing ransomware is not a novelty. Last year some CryptXXX variants were spotted in engaging in data stealing activity as well.

Locky strikes again in a new disguise

While the title of “Locky ransomware” had been regularly flickering in the media headlines last year, its authors has not abandoned this project. In fact, the time periods between each version imply that the crooks have been working on the new more destructive techniques. Consequently, this summer they decided to drop the habit of naming their virus versions after the names of Egyptian and Scandinavian deities and return to the European mythology.

IT specialists have caught its new version – Diablo6 ransomware – spreading via a new malicious spam campaign. However, observing the tendency, Locky developers have not mastered any extraordinary new technique. As in previous cases, they test targeted users’ curiosity. The compromised email might be sent from an unknown sender with a brief message content: “Files attached. Thanks

Opening the E [date] (random_numer).docx file will executes VBS downloader script which then downloads the main payload of the virus. During the encryption process, the malware will append ridiculously long [first_8_hexadecimal_chars_of_id]-[next_4_hexadecimal_chars_of_id]-[next_4_hexadecimal_chars_of_id]-[4_hexadecimal_chars]-[12_hexadecimal_chars].diablo6 file extension. The current version is relatively modest—it only asks for .49 bitcoin amounting $1.600.

Unfortunately, neither of the ransomware threats are decryptable at the moment. While cyber security specialists continue working on the countermeasures, the virtual community should arm up with awareness and knowledge. Except Cerber, which indeed keeps evolving at the alarming rate, Locky developers seem to rely on the same spam campaigns. If you manage to bridle your curiosity and treat incoming spam emails with cautiousness, you will lower the risk of encountering file-encrypting threats.

AdsKeeper and Stack Player continue bombarding web browsers with ads

Researchers noticed an increased activity of adware programs

Recently, cyber security experts noticed an increased activity in AdsKeeper and Stack Player distribution. These two ad-supported programs are well-known for a while. They have already made browsing the web complicated for hundreds of thousands of computer users.

These programs are known for:

  • being capable of entering the system in software bundles;
  • altering browser’s settings;
  • using “virtual layer” to display third-party ads;
  • delivering an excessive amount of ads;
  • delivering misleading and malicious ads;
  • redirecting to high-risk websites;
  • tracking information about users.

All these negative features disturb browsing the web and make the system vulnerable. For this reason, infected computers become easily accessible to other cyber threats and malware.

We want to point out that you should be careful when installing freeware or shareware. This two adware are widely spreading with PDF converters, video players, and other free programs. Thus, in order to avoid it, you should:

  • choose reliable sources for software installation;
  • use Advanced/Custom installation settings;
  • do not rush to click “Next” button;
  • unmark all third-party entries offered to download together with the primary program.

The major issues caused by AdsKeeper adware

Nevertheless, AdsKeeper is a legitimate advertising program; it might pose a danger to computer users. Some of the ads delivered by this ad-supported application might redirect to potentially dangerous websites.

The problems begin then adware enters the system silently. It might alter targeted browser’s settings in order to display third-party commercial content on various sites. The PUP might deliver ads even on well-known sites. Thus, you can be easily tricked that offer is reliable and safe to click.

However, research has shown that some of the AdsKeeper ads have nothing in common with safety and credibility. Cybercriminals and scammers often take advantage of this advertising platform in order to spread malicious ads.

Within one click, you might end up on tech support scam or phishing website. Crooks might convince you into installing bogus software or revealing personal information. Thus, this adware might be responsible for helping criminals to reach innocent computer users.

It doesn’t matter that it’s not an intended purpose of the adware program. You should take care of your privacy and computer by performing AdsKeeper removal.

The main characteristics of Stack Player virus

Stack Player is advertised as useful video streaming tool that allows browsing through the huge library of video content and watching it straight through the desktop. Indeed, this free application might seem interesting for those who spend hours watching videos.

However, it’s hard to talk about this program’s functionality because it’s impossible to keep it for a long on the computer. After the installation, it instantly starts tracking information about users and delivers suspicious ads on each visited website.

One of the main problems is that Stack Player ads redirect to high-risk websites or promote bogus antivirus, PC optimization software or suspicious browser extensions. Misleading security alerts and offers to install crucial updates might hide malware as well.

Thus, we want to remind that you should stay away from this program and be careful with installation of freeware or shareware. This program might enter the system bundled too. However, if you already made a mistake and allowed this program to settle in your PC, we recommend following Stack Player removal instructions and getting rid of adware immediately. marketing platform comes to life again ads are looking for new victims

If you have run into the website having a ridiculously long URL domain name starting with, you are likely to see a congratulatory alert. It might come from a supposed Google Rewards Center or most recent one – Facebook Reward Center.

Before you hit the ceiling with joy for supposedly having won an iPhone or another valuable product, let us remind you that it is simply a fake alert. Alternatively, other users may encounter alerts suggesting to update their browsers, Java or Adobe Flash Player.

Advertising intertwines with malvertising

Even though the domain is entitled as Ad Network Performance, it has been one of the oldest spam and adware samples. Originally, such alerts may have simply annoyed you to death, but recent findings suggest that they divert towards a new trend – malvertising.

Due to the popularity of social networks, such as Twitter or Facebook, you might notice the number of supposedly affiliated websites which offer you to reclaim their free giveaways.

A while ago, another spam felony infiltrated Facebook deceiving users with supposedly free flight tickets. It was not only a surprise for netizens but for the very companies which have been mentioned.

Then, users had to fill up a short survey. Then, they would be redirected to an affiliate website which requires entering private information – phone numbers or email address. functions the same. If you disclose any of such details in one of the affiliated websites, get ready for the stream of ads popping up during browsing sessions or cramming your Spam folder.

Another key problem is that this domain is only the tip of the iceberg. There are multiple others:,,,,, etc.

Old tricks along with new strategies

It is surprising that such adware and malvertising techniques are quite old and there have been numerous articles written on this topic, still a high number of users take the bait. It explains why fraudsters have revived marketing technique.
Besides this well-known strategy, keep in mind that crooks come up with new astounding techniques.

Felons have developed a way how to foist malware for users. They do not need to click on a corrupted link or a file – hovering over it is enough. Despite how elaborate spam techniques might emerge, cautiousness remains the ultimate weapon escaping such felony.

The name of Zeus Trojan is widely used by scammers

Tech support scammers send fake alerts about Zeus infection

Zeus Trojan is one of the oldest banking Trojans that started its career in July 2007. Malware has already affected hundreds of thousands of companies, banks, and governmental institutions. Nevertheless, criminals ended their career in 2011; their followers continued spreading new variants of the Trojan.

Meanwhile, scammers, who lack of imagination or creativity, took the name of the trojan in their illegal projects. The name of the banking Trojan is widely used in various technical support scams.

Undoubtedly, the purpose of such scams is to scare people and make them call to fake tech support line where “certified technicians” are willing to help to clean a virus from the computer.

Examples of tech support scams

Getting infecting with Zeus is a terrifying experience. Scammers are aware of human psychology and fear of catching computer infections. Thus, the name of the dangerous banking Trojan should help to commit another cyber crime.

Such scams usually deliver messages in the browser’s window, such as “Windows Defender Alert: Zeus Virus”, “Windows Detected ZEUS Virus” or “You Have A ZEUS Virus.” All these fake alerts state the same – your computer is infected; call the provided number.

However, none of these messages are true. Only antivirus program installed on your PC can inform about malware attack in a program notification window.

All other alerts that appear on the browser are fake, and most probably, created by cyber criminals who are willing to take control over your computer, obtain your personal information or sell a useless software.

Signs of the real Zeus attack

If you ever find yourself on the website that informs about dangerous banking Trojan residing on the system, you should not take any spontaneous actions. Especially, do not grab your phone to call the provided number.

As we have already mentioned, online security alerts are fake. What is more, usually crooks introduce themselves as Microsoft technicians. However, Microsoft does not have a phone support line. Thus, it’s the main sign that you have been scammed.

The real Zeus malware attack is followed by slow computer’s performance, disabled security software, unknown system errors, increased amount of aggressive online ads, and of course, suspicious financial transactions or even empty bank account.

We want to remind that once you suspect that your computer is infected, you should run a full system scan with an updated security tool immediately.