Virus and Spyware Removal Guides, uninstall instructions
What kind of malware is GoPIX?
GoPIX is a malicious program targeting the Pix instant payment platform. Essentially, this malware operates as a clipper designed to reroute transactions made through the Pix platform. It does also work as a more standard clipper, i.e., the program likewise targets cryptocurrency transactions.
GoPIX has been around since at least December 2022. As Pix was created and managed by the Central Bank of Brazil (BCB), its user base naturally consists of Brazil's citizens. Therefore, GoPIX activity is almost exclusive to Brazil.
What kind of software is Equidae?
Equidae is a malicious extension compatible with Google Chrome and Microsoft Edge. This software can manipulate and manage browsers, and these functionalities can be used for a variety of harmful activities. Additionally, this browser extension collects vulnerable information.
Our research team discovered an installation setup containing Equidae on a deceptive webpage found during a routine investigation of untrustworthy sites.
What kind of malware is Lumar?
Lumar is a lightweight stealer-type malware written in the C programming language. As its classification implies, this piece of software is designed to steal information. Data of interest includes Internet cookies, stored passwords, and cryptocurrency wallets.
Lumar was first noted being promoted on hacker forums in July of 2023. Due to this program being offered for sale, its distribution may vary based on the cyber criminals using it.
What kind of scam is "Virus/Malware Infections Have Been Recognized"?
"Virus/Malware Infections Have Been Recognized" is a technical support scam that our researchers found while inspecting rogue websites. This scheme aims to deceive users into calling fake Microsoft Support by claiming that their device is infected.
What kind of email is "Adobe Invoice"?
Our examination of this "Adobe Invoice" email revealed that it is spam. The letter is presented as an invoice for a year-long subscription to Adobe. It is the lure used to trick recipients into a callback scam. Oftentimes, the goal of such schemes is to deceive victims into disclosing private data or making monetary transactions.
What kind of software is PsittacosaurusMongoliensis?
PsittacosaurusMongoliensis is a malicious browser extension discovered by our researchers during a routine investigation of dubious websites. It is worth mentioning that the type of installation setup used to promote this extension might also be bundled with adware, browser hijackers, PUAs, and other software.
What kind of software is DiprotodonOptatum?
DiprotodonOptatum is a malicious browser extension that our research team discovered in an installer endorsed on a deceptive website. This piece of software is capable of manipulating browsers and extracting sensitive data from them.
It is noteworthy that installation setups carrying software like DiprotodonOptatum may be bundled with adware, browser hijackers, PUAs, or other unwanted/malicious software.
What kind of scam is "Ransomware EXE.01092-1_Alert"?
Our research team discovered the "Ransomware EXE.01092-1_Alert" technical support scam during a routine inspection of suspect websites. The scheme warns users of fake system infections to deceive them into calling a bogus support line.
It is noteworthy that in some cases the "Ransomware EXE.01092-1_Alert" pop-up is be followed up by the "Trojan:Slocker" scam.
What kind of scam is "Trojan:Slocker"?
While investigating deceptive websites, our researchers discovered the "Trojan:Slocker" technical support scam. It warns that the visitor's device has been infected with trojan/ransomware and urges them to call the provided helpline. Note that this scheme may be preceded by the "Ransomware EXE.01092-1_Alert" pop-up.
It must be stressed that the infection claims are fake, and this content is in no way associated with the Microsoft Corporation or any of its products/services.
What kind of malware is Zpww?
Zpww is a ransomware-type program that our research team discovered while investigating malware. It belongs to the Djvu ransomware family. Zpww operates by encrypting data and demanding ransoms for its decryption.
On our testing system, Zpww encrypted files and altered their filenames. Original titles were appended with a ".zpww" extension, e.g., a filename such as "1.jpg" appeared as "1.jpg.zpww", "2.png" as "2.png.zpww", etc. Once this process was finished, a ransom note – "_readme.txt" – was created.
It must be mentioned that ransomware belonging to the Djvu family often infiltrates devices together with data-stealing malware, such as RedLine, Vidar, or others.
More Articles...
Page 164 of 2139
<< Start < Prev 161 162 163 164 165 166 167 168 169 170 Next > End >>