Virus and Spyware Removal Guides, uninstall instructions

Covid19 Warning Alert POP-UP Scam

"Covid19 Warning Alert" scam removal instructions

What is the "Covid19 Warning Alert"?

"Covid19 Warning Alert" is a scam, promoted on deceptive websites. The scheme claims that users must contact tech support, as their devices have been infected with malware and with COVID-19 (which is not a computer virus but an infectious disease). Users should note that all of the information provided by "Covid19 Warning Alert" is false. Typically, deceptive sites are accessed via redirects caused by intrusive advertisements or by PUAs (Potentially Unwanted Applications), already infiltrated into the system.

   
TopStreamsSearch Browser Hijacker

TopStreamsSearch browser hijacker removal instructions

What is TopStreamsSearch?

TopStreamsSearch is a browser hijacker, designed to make alterations to browser settings in order to promote topstreamssearch.com - a fake search engine. This piece of software is also capable of tracking users' browsing activity and extracting sensitive information from it. Due to the questionable techniques used to distribute TopStreamsSearch, it is considered to be a PUA (Potentially Unwanted Application).

   
ConnectionIndexer Adware (Mac)

How to remove ConnectionIndexer adware from Mac?

What is ConnectionIndexer adware?

ConnectionIndexer is an adware-type application with browser hijacker traits. Following successful infiltration, it runs intrusive advertisement campaigns, makes modifications to browser settings and promotes fake search engines. ConnectionIndexer promotes (through akamaihd.net) Safe Finder. Additionally, most adware and browser hijackers collect information relating to browsing activity. Due to the questionable methods used to distribute ConnectionIndexer, it is categorized as a PUA (Potentially Unwanted Application). One of the techniques employed to proliferate it is via fake Adobe Flash Player updater/installer. Users should note that illegitimate software updaters/installers often distribute not only PUAs but trojans, ransomware and other malware as well.

   
PDFConverterSearch Browser Hijacker

PDFConverterSearch browser hijacker removal instructions

What is PDFConverterSearch browser hijacker?

PDFConverterSearch is a piece of rogue software, classified as a browser hijacker. Following successful infiltration, it makes changes to browser settings in order to promote pdfconverter-search.com - a fake search engine. This browser hijacker also has data tracking abilities, which are employed to collect information relating to browsing activity. Due to the dubious techniques used to distribute PDFConverterSearch, it is considered to be a PUA (Potentially Unwanted Application).

   
Deadfiles Ransomware

Deadfiles ransomware removal instructions

What is the Deadfiles ransomware?

Deadfiles is a piece of malicious software, belonging to the MedusaLocker ransomware family. This malware's discovery is credited to Michael Gillespie. It is designed to encrypt data and demand payment for the decryption. As Deadfiles ransomware encrypts, all of the affected files are appended with the ".deadfiles" extension. For example, a file like "1.jpg" would appear as "1.jpg.deadfiles" - following encryption. Once this process is complete, ransom notes - "Recovery_Instructions.html" - are dropped into compromised folders.

   
OneDrive Email Scam

"OneDrive Email Scam" removal guide

What is "OneDrive Email Scam"?

"OneDrive Email Scam" refers to a spam campaign, used to steal email account credentials (passwords) via Google Forms - a survey administration platform. The term "spam campaign" defines a large-scale operation, during which thousands of deceptive emails are sent. The letters, sent during this spam campaign, claim a file has been shared with the recipients. However, when they try to access the file - users are asked to provide their email account credentials.

   
ABB Email Virus

"ABB Email Virus" removal guide

What is "ABB Email Virus"?

"ABB Email Virus" refers to a spam campaign, designed to proliferate the AgentTesla Remote Access Trojan (RAT). The term "spam campaign" is used to define a mass-scale operation, during which thousands of scam emails are sent. The letters, distributed via "ABB Email Virus" spam campaign, are disguised as mail from the Malaysian branch of the ABB Group, multinational corporation primarily dealing in robotics, power, heavy electrical equipment and automation technology. It must be emphasized that these emails are in no way connected to the genuine ABB corporation.

   
BitCoin Clipper

BitCoin Clipper virus removal guide

What is BitCoin Clipper?

BitCoin Clipper is a piece of malicious software, targeting cryptocurrency transactions. It operates by replacing the recipient cryptocurrency wallet (cryptowallet) addresses with ones belonging to the cyber criminals behind BitCoin Clipper malware. Additionally, this malicious program can inject infected systems with the Supreme botnet mining client and the Poullight information stealer. Thereby, broadening the malware's functionality and increasing the potential risks associated with its infections.

   
SearchPDFConverterz Browser Hijacker

SearchPDFConverterz browser hijacker removal instructions

What is SearchPDFConverterz?

SearchPDFConverterz is a piece of rogue software that is designed to make modifications to browser settings in order to promote searchpdfconverterz.com - a fake search engine. Additionally, SearchPDFConverterz collects information relating to browsing activity. Due to how it operates, it is classified as a browser hijacker. Since most users install SearchPDFConverterz unintentionally, it is also considered to be a PUA (Potentially Unwanted Application).

   
1dec Ransomware

1dec ransomware removal instructions

What is 1dec ransomware?

Discovered by Marcelo Rivero, 1dec is a malicious program belonging to the Dharma ransomware family. This malware is designed to encrypt data and demand ransoms for the decryption. During the encryption process, all of the compromised files are retitled following this pattern: original filename, unique ID assigned to the victims, cyber criminals' email address and the ".1dec" extension. For example, a file like "1.jpg" would appear as something similar to "1.jpg.id-1E857D00.[gocrypt@aol.com].1dec" - following encryption. After this process is complete, ransom notes are created in a pop-up window and "FILES ENCRYPTED.txt" text file.

   

Page 1 of 1039

<< Start < Prev 1 2 3 4 5 6 7 8 9 10 Next > End >>
Malware activity

Global malware activity level today:

Medium threat activity

Increased attack rate of infections detected within the last 24 hours.

Virus and malware removal

This page provides information on how to avoid infections by malware or viruses and is useful if your system suffers from common spyware and malware attacks.

Learn about malware removal