News

Maze’s Sneaky New Trick

The Maze gang was last in the news when they managed to pull off a successful attack on Canon. This is but one of the gang’s many exploits and once more the group is in the news, not for a high profile victim but for tactics adopted that will likely add to the growing list of Maze’s victims. The gang is no stranger to adopting new tactics successfully. The gang was in all likelihood the first to start releasing data stolen from victims who do not pay promptly. Now the group has adopted a tactic seen used by Ragnar Locker to remain undetected until it is too late. According to Sophos Labs, the Maze gang has now been seen using Ragnar Locker’s virtual machine technique to remain undetected by endpoint security applications. Sophos Labs’ published an article detailing the discovery and how it is carried out recently, however, the discovery was made when tracking a Maze campaign dating back to July 2020. Simply put t...

2,000 Magento Stores Hacked in one Weekend

While ransomware continues to dominate internat...

A New Ransomware Variant and a New Victim

It seems like it would be easier to win a massi...

SWIFT’s Research reveals new levels of Money Mule Activity

For those looking to prosecute cybercriminals a...

Top Removal Guides

Search.yahoo.com Redirect

Search.yahoo.com is a legitimate search engine, developed by the Yahoo! web services provider. However, users can experience undesirable redire...

Bing.com Redirect

Bing.com is a legitimate Internet search engine. This site is developed by a legitimate company and is not related to any virus or malware. Be ...

Support Forum

This forum was created to individually help our readers with spyware and virus removal. Feel free to post your questions and our staff will do their best to answer them and provide the latest relevant information.

New Removal Guides

Bl9c98vcvv Ransomware

Bl9c98vcvv is a malicious program, belonging to the Xorist ransomware family. This malware encrypts files stored on infected systems - in order to demand payment for the decryption. During the encryption process, all of the affected files are appended with the ".Bl9c98vcvv" extension. For example, a file originally named something like "1.jpg" would appear as "1.jpg.Bl9c98vcvv" - following encryption. Once this process is complete, ransom notes are created in a pop-up window and "HOW TO DECRYPT FILES.txt" text files, which are dropped into compromised folders. The ransom-demanding messages are identical and written in both English and Portuguese languages. The text presented in the pop-up window and "HOW TO DECRYPT FILES.txt" informs victims that their data has been encrypted. To decrypt the files, users are instructed to purchase the decryption keys from the cyber criminals behind the ransomware infection...

Allsearch App Browser Hijacker

Allsearch App is a piece of rogue software,...

PowerSmash Browser Hijacker

PowerSmash browser hijacker is designed to ...

Amazon Loyalty Program POP-UP Scam

This deceptive website is designed to look ...

Top Antispyware

SpyHunter 5

Overview: Simply put a rootkit is a program or, more often, a collection of software tools that gives the hacker remote access to and control ov...

Malwarebytes 4.0

There are two versions of Malwarebytes 4.0 - Free and Premium. Although the Free version is capable of removing existing malware, the Premium del...

Top Antivirus

Combo Cleaner: Antivirus and System Optimizer (for Mac computers)

Appearance of Combo Cleaner: Antivirus and System Optimizer: Today, security researchers see a rise in adware targeted at Mac computers. While...

ESET NOD32 Antivirus 2020

Appearance of ESET NOD32 Antivirus 2020: Product Range Like many of ESET’s competitors, the company offers numerous tiers within its product ...

Malware activity

Global malware activity level today:

Medium threat activity

Increased attack rate of infections detected within the last 24 hours.

Virus and malware removal

This page provides information on how to avoid infections by malware or viruses and is useful if your system suffers from common spyware and malware attacks.

Learn about malware removal

Stay in touch with PCrisk