Here’s a list of possible indicators that your computer may be infected with Blackshades or similar remote access tool malware:
- Mouse cursor moves erratically with no input from user;
- Web camera light (if equipped) unexpectedly turns on when web camera is not in use;
- Monitor turns off while in use;
- Usernames and passwords for online accounts have been compromised;
- Unauthorized logins to bank accounts or unauthorized money transfers;
- Text-based chat window appears on your computer’s desktop unexpectedly;
- Computer files become encrypted and ransom demand is made to unlock files.
Blackshades malware affects Microsoft Windows-based operating systems. If you believe you or someone you know may have a computer that is infected with this malware, search the computer’s hard drive for the following files that are known to be present on Blackshade-infected computers:
To
perform the above check, click the Start menu and type each file name
in the search field. If the search yields positive matches for one or
more of these files, the computer may be infected with Blackshades.
In
addition to the above files being added to the computer’s hard drive,
Blackshades also makes modifications to the Windows registry. The exact
location may vary depending on the verson of the Microsoft Windows
you’re using, but the following registry subkey is added:
- Computer\HKEY_CURRENT_USER\Software\VBandVBA Program Settings\SrvID\ID\[string of letters and numbers]
To perform a check for this registry modification, take the following steps:
- Click the Start menu.
- Type “regedit” in the search field.
- Execute the Registry Editor (regedit.exe). If prompted, select “Yes” to allow the program to make changes to the computer.
- Select “Edit” from the window toolbar.
- Select “Find” from the Edit menu.
- Type “SrvID” in the Find field.
OR easy way
DOWNLOAD BLACKSHADE REMOVER
http://www.theatregelap.com/2014/05/phrozensoft-blackshades-detector.html
DOWNLOAD BLACKSHADE REMOVER
http://www.theatregelap.com/2014/05/phrozensoft-blackshades-detector.html