HackTool.WpaKill
Short bio
HackTool.WpaKill is Malwarebytes’ generic detection name for a type of riskware that is intended to use certain software illegally.
Type and source of infection
Riskware, in general, is a detection for items that are not strictly malicious, but pose some sort of risk for the user in another way. The use of this hacking tool can have legal consequences.
Cracks, keygens, and other programs of this nature are often found on shady websites.
Protection
Malwarebytes protects users from HackTool.WpaKill by using real-time protection.

Malwarebytes blocks HackTool.WpaKill
Remediation
Malwarebytes can detect and remove HackTool.WpaKill without further user interaction.
- Please download Malwarebytes to your desktop.
- Double-click mb3-setup-consumer-{version}.exe and follow the prompts to install the program.
- Then click Finish.
- Once the program has fully updated, select Scan Now on the Dashboard. Or select the Threat Scan from the Scan menu.
- If another update of the definitions is available, it will be implemented before the rest of the scanning procedure.
- When the scan is complete, make sure that all Threats are selected, and click Remove Selected.
- Restart your computer when prompted to do so.
Add an exclusion
Should users wish to keep this program and exclude it from being detected in future scans, they can add the program to the exclusions list. Here’s how to do it.
The Exclusions tab includes a list of items to be excluded from scans. The items may include files, folders, websites, or applications that connect to the Internet, as well as previously detected exploits.
To access the exclusions in Malwarebytes:
- Click on the Settings tab in the left pane.
- Click on the Exclusions tab.
- Click the Add Exclusion button.
- Select the exclusion type Exclude a File or Folder and use the Browse button to select the main folder for the software that you wish to keep.
- Repeat this for any secondary folder(s) that belong to the software.
- If you want to allow the program to connect to the Internet, for example to fetch updates, add an exclusion of the type Exclude an application that Connects to the Internet and use the Browse button to select the file you wish to grant access.
Related blog content
Debunking the hacker stereotype: Who are the real monsters?
10 ways to protect against hackers
RELATED ARTICLES
April 30, 2012 - Malwarebytes Anti-Malware is under constant attack. 24 hours per day, 7 days per week, 365 days per year. If you read my recent blog post about the development of Malwarebytes Chameleon, you know that we at Malwarebytes have big red ‘X’s on our chests; the bad guys are always out to get us. Malwarebytes Anti-Malware...
April 24, 2012 - The fight against malware is a cat-and-mouse game. It is constant and constantly escalating. They make a move, you counter it, they counter your counter, lather, rinse, repeat. What’s more: malware almost always has the advantage. Our software Malwarebytes Anti-Malware earned a reputation for having a high success rate in combating new in-the-wild malware infections:...