News

DoppelPaymer the Doppelganger Ransomware

A new week, a new ransomware variant seems to be an ongoing trend in the digital realm. This week continues the trend with news emerging of the discovery of a new ransomware variant, called DoppelPaymer. The new ransomware has been seen to be infecting victims since mid-June with the ransom asked sometimes topping hundreds of thousands of USD. According at security firm CrowdStrike the ransomware has seen at least eight variants which have extended the malware’s capabilities with each successive variant, the first of these dates back to April of this year. DoppelPaymer takes its name from another ransomware BitPaymer, from which the early copies much of the latter’s code. Despite the similarities in the source code between the two pieces of malware, there are significant differences between the two. CrowdStrike noted that, “There are obvious similarities between the tactics, techniques, and procedures (TTPs) u...

Android Malware Agent Smith Infesting Mobile Devices

A new Android malware has been discovered. What...

Astaroth Living off the Land

Depending on what circles you associate yoursel...

Sodinokibi Ransomware Exploiting Windows Zero-Day

With the malware developers behind GandCrab sup...

Top Removal Guides

Bing.com Redirect

Bing.com is a legitimate Internet search engine. This site is developed by a legitimate company and is not related to any virus or malware. Be ...

Search.yahoo.com Redirect

Search.yahoo.com is a popular website that can be used as the browser homepage or default Internet search engine. Recently, there is a rise in ...

Support Forum

This forum was created to individually help our readers with spyware and virus removal. Feel free to post your questions and our staff will do their best to answer them and provide the latest relevant information.

New Removal Guides

V6cye Ransomware

V6cye is a ransomware-type infections that belongs to Snatch ransomware family. This malware is designed to encrypt data and to make ransom demands. While encrypting, V6cye adds ".v6cye" appendix to each filename. Additionally, V6cye drops "RESTORE_V6CYE_FILES.txt" text file on victim's desktop. This ransomware was firstly discovered by Michael Gillespie. The created text file delivers a message informing victims about the current situation and stating that only V6cye's developers are capable of restoring data. Unfortunately, this is true. Each victim gets a unique decryption key which is necessary to restore data. The problem is that all keys are stored in a remote server controlled by cyber criminals. Therefore, in order to receive the key each victim has to contact V6cye's developers. After doing so, victims will be asked to pay a ransom in exchange for the key. The price is currently unknown - all deta...

Berosuce Ransomware

Discovered by Michael Gillespie, Berosuce i...

Gloyah.net Ads

gloyah[.]net is a website related to adf.ly...

Top Antispyware

SpyHunter 5

Overview: Simply put a rootkit is a program or, more often, a collection of software tools that gives the hacker remote access to and control ov...

Malwarebytes Anti-Malware

Malwarebytes Anti-malware Pro costs $24.95 for a lifetime license and includes additional features not available in the free version, such as rea...

Top Antivirus

Combo Cleaner: Antivirus and System Optimizer (for Mac computers)

  Supported platforms: At time of testing, Combo Cleaner was only available for Mac computers running the Mac OSX 10.10 (Yosemite), Mac OSX 1...

Avast Internet Security

Cost Many antivirus producers are wondering what it takes to make a successful paid for suite. What needs to be included to justify the price ta...

Malware activity

Global virus and spyware activity level today:

Medium threat activity
Medium

Increased attack rate of infections detected within the last 24 hours.

Virus and malware removal

This page provides information on how to avoid infections by malware or viruses and is useful if your system suffers from common spyware and malware attacks.

Learn about malware removal

Stay in touch with PCrisk