Step-by-Step Malware Removal Instructions

Blender Ransomware
Ransomware

Blender Ransomware

We have discovered the Blender ransomware while checking the malware samples submitted to VirusTotal. We found that it is part of the VoidCrypt ransomware family. After testing the ransomware, we learned that it encrypts files, modifies their filenames, and provides ransom notes in a pop-up window

Click-and-continue.live Ads
Notification Spam

Click-and-continue.live Ads

While inspecting websites that use rogue advertising networks, we discovered the click-and-continue[.]live website. It is designed to push its spam browser notifications, load questionable content, and redirect visitors to other untrustworthy/hazardous webpages. Most visitors to click-and-continu

VSOP Ransomware
Ransomware

VSOP Ransomware

Our researchers detected VSOP ransomware during a routine inspection of new malware submission on VirusTotal. While analyzing a sample, we learned that this ransomware encrypts files and appends their names with a ".PPLIT" extension. To elaborate, a file initially titled "1.jpg" appeared as "1.jpg

YouTube Ad Remover Adware
Adware

YouTube Ad Remover Adware

YouTube Ad Remover is a rogue browser extension, which we have researched. On its "official" site, this extension is promoted as a tool capable of blocking advertisements on YouTube videos. However, we found that when installed on Google Chrome, YouTube Ad Remover promises only to auto-skip said a

Next-notification.com Ads
Notification Spam

Next-notification.com Ads

We have examined the next-notification[.]com page and concluded that the main purpose of this page is to trick visitors into allowing it to show notifications. Our team has discovered next-notification[.]com while browsing illegal streaming, torrent sites, and similar pages that use questionable a

Newexploit Ransomware
Ransomware

Newexploit Ransomware

Newexploit is the name of a ransomware-type program, which our researchers have sampled from VirusTotal. Once launched on our test machine, Newexploit encrypted files and appended their filenames with a ".exploit" extension. For example, a file initially named "1.jpg" afterwards looked like "1.jpg

Digital Info Adware
Adware

Digital Info Adware

We have spotted the Digital Info extension on a shady website offering to update an installed extension. After adding this app to the Chrome browser and testing it, we have learned that it generates advertisements. Therefore, we have categorized this app as advertising-supported software.

Update Required To Avoid Login Interruption Email Scam
Phishing/Scam

Update Required To Avoid Login Interruption Email Scam

After analyzing this email, we have discovered that it is a phishing email (it contains a link to a phishing website). Scammers behind it attempt to trick recipients into providing personal information such as email addresses and passwords required to access Microsoft and possibly other accounts.

Theironnews.site Ads
Notification Spam

Theironnews.site Ads

While investigating rogue websites, our researchers discovered that theironnews[.]site is an untrustworthy page designed to promote spam browser notifications. It can also redirect visitors to other unreliable and dangerous sites. Most users access webpages like theironnews[.]site via others using

AIC Contracting Email Virus
Phishing/Scam

AIC Contracting Email Virus

Our team has inspected this email and concluded that it is part of a malicious spam campaign. Cybercriminals use it to distribute Agent Tesla - a Remote Administration Trojan. Their goal is to trick recipients into executing a file extracted from the malicious attachment (archive file). We