{"id":234,"date":"2017-02-21T16:00:48","date_gmt":"2017-02-21T16:00:48","guid":{"rendered":"http:\/\/esolutions.lt\/blog\/?p=234"},"modified":"2017-02-21T16:03:43","modified_gmt":"2017-02-21T16:03:43","slug":"youndoo-virus-renews-its-activity","status":"publish","type":"post","link":"https:\/\/esolutions.lt\/blog\/youndoo-virus-renews-its-activity\/","title":{"rendered":"Youndoo virus renews its activity"},"content":{"rendered":"<p>2016 was a busy year for security experts &#8211; computer virus\u00a0business was booming and everyone was asking for help. Of course, the main problem\u00a0which caused\u00a0a serious havoc on the Internet was an infamous Locky. As soon as this ransomware showed up, the amount of infected users increased from\u00a023,000 to 56,000 cases per month. However, the latest trends reveal\u00a0that there is a lot more to come in 2017. New viruses, including <a href=\"http:\/\/www.2-spyware.com\/remove-spora-ransomware-virus.html\">Spora ransomware<\/a>, HakunaMatata or Help_Help_help virus (new Cerber&#8217;s version), have already emerged. Nevertheless,\u00a0it seems that we should not forget the old ones.<\/p>\n<p>Security experts are\u00a0reporting about a\u00a0fresh tendency &#8211;\u00a0reappearance of well-known viruses that were launched back in 2015 or 2016. We have already <a href=\"http:\/\/esolutions.lt\/blog\/crypt0l0cker-is-expected-to-begin-the-second-round\/\">notified<\/a>\u00a0you about Crypt0l0cker which was first detected in the middle of 2015. Beware that it has just been noticed starting its second round of propagation. It seems that we should also not forget <a href=\"http:\/\/www.2-spyware.com\/remove-youndoo-com.html\">Youndoo virus<\/a>. The most affected countries seem to be Denmark, Germany, Spain, Portugal and Hungary. Please, be careful with this browser hijacker. No matter that it is not capable of encrypting your files, it can cause unauthorized redirects on your browser. Browser redirects have already been\u00a0named one of the main ways leading PC users to the infiltration of malware.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>2016 was a busy year for security experts &#8211; computer [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":236,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[2],"tags":[],"_links":{"self":[{"href":"https:\/\/esolutions.lt\/blog\/wp-json\/wp\/v2\/posts\/234"}],"collection":[{"href":"https:\/\/esolutions.lt\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/esolutions.lt\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/esolutions.lt\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/esolutions.lt\/blog\/wp-json\/wp\/v2\/comments?post=234"}],"version-history":[{"count":1,"href":"https:\/\/esolutions.lt\/blog\/wp-json\/wp\/v2\/posts\/234\/revisions"}],"predecessor-version":[{"id":235,"href":"https:\/\/esolutions.lt\/blog\/wp-json\/wp\/v2\/posts\/234\/revisions\/235"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/esolutions.lt\/blog\/wp-json\/wp\/v2\/media\/236"}],"wp:attachment":[{"href":"https:\/\/esolutions.lt\/blog\/wp-json\/wp\/v2\/media?parent=234"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/esolutions.lt\/blog\/wp-json\/wp\/v2\/categories?post=234"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/esolutions.lt\/blog\/wp-json\/wp\/v2\/tags?post=234"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}