Virus and Spyware Removal Guides, uninstall instructions Ads

What kind of page is advertizementtoyou[.]com?

While examining advertizementtoyou[.]com, our team learned that this page is designed to lure visitors into agreeing to receive notifications. Advertizementtoyou[.]com uses a clickbait technique to obtain permission to deliver notifications. It also redirects to other websites.

Secure Audio Relay Adware

What kind of software is Secure Audio Relay?

After testing the Secure Audio Relay application, we learned that it bombards users with intrusive advertisements. Software of this type is called adware. Our team discovered Secure Audio Relay on a shady website. It is common for adware to be promoted and distributed using questionable (often deceptive) methods. Ads

What kind of page is track-scanner[.]com?

Our research team found the track-scanner[.]com rogue page during a routine inspection of questionable websites. It is designed to host online scams, promote browser notification spam, and redirect visitors to other (likely untrustworthy/malicious) webpages.

Most users enter sites like track-scanner[.]com via redirects caused by pages that use rogue advertising networks.

ClutchTrend Adware (Mac)

What is ClutchTrend?

While inspecting new submissions to VirusTotal, our researchers found the ClutchTrend application. Our analysis revealed that this app operates as advertising-supported software (adware). Furthermore, it is pertinent to mention that ClutchTrend is part of the AdLoad malware family. Redirect

What is is the address of a fake search engine. Websites of this kind are promoted by browser-hijacking software. It modifies browser settings in order to cause redirects to illegitimate search engines. Furthermore, browser hijackers and the sites they promote usually collect private data, which makes them a privacy threat.

DataBankasi Ransomware

What is DataBankasi ransomware?

DataBankasi is a piece of malicious software categorized as ransomware. It is designed to encrypt data and demand ransoms for decryption.

After we executed a sample of DataBankasi on our test system, this ransomware encrypted files and appended their filenames with a ".databankasi" extension. For example, a file initially titled "1.jpg" appeared as "1.jpg.databankasi", "2.png" as "2.png.databankasi", and so forth.

Once this process was completed, a ransom note in Turkish - "---BILGILENDIRME----NOTU---.txt" - was dropped onto the desktop.

Spartan Hack Ransomware

What kind of malware is Spartan Hack?

Spartan Hack is the name of ransomware based on another ransomware called Chaos. We discovered it while examining malware samples submitted to the VirusTotal website. The purpose of Spartan Hack is to encrypt files (to make them inaccessible for victims). Also, Spartan Hack renames files, changes the desktop wallpaper, and creates a ransom note (the "read_it.txt" file).

Spartan Hack renames files by appending four random characters as their new extension. For example, it renames "1.jpg" to "1.jpg.plwx", "2.png" to "2.png.8chy", "3.exe" to "3.exe.utbj", and so forth.

ExplorerIndex Adware (Mac)

What kind of application is ExplorerIndex?

ExplorerIndex is an advertising-supported application. The purpose of this application is to generate intrusive advertisements. Usually, adware is promoted and distributed using deceptive methods. We discovered ExplorerIndex while inspecting deceptive websites suggesting that the Adobe Flash Player (or other software) is out of date.

Windows Defender Email Scam

What is "Windows Defender email scam"?

"Windows Defender email scam" refers to spam emails disguised as messages regarding a contract renewal for "Windows Defender". It must be emphasized that these letters are fake and in no way associated with the Microsoft Defender Antivirus (formerly named Windows Defender) or its developers - the Microsoft Corporation.

RokRAT Malware

What kind of malware is RokRAT?

RokRAT is the name of a Remote Administration Trojan (RAT). Cybercriminals use RATs to access infected computers remotely and perform malicious tasks. RATs allow them to achieve almost any objective on the infected system. Usually, RATs are used to drop additional payloads (inject other malware) or steal sensitive information.


Page 2 of 1661

<< Start < Prev 1 2 3 4 5 6 7 8 9 10 Next > End >>
About PCrisk

PCrisk logo

PCrisk is a cyber security portal, informing Internet users about the latest digital threats. Our content is provided by security experts and professional malware researchers. Read more about us.

Malware activity

Global malware activity level today:

Medium threat activity

Increased attack rate of infections detected within the last 24 hours.

Virus and malware removal

This page provides information on how to avoid infections by malware or viruses and is useful if your system suffers from common spyware and malware attacks.

Learn about malware removal