Virus and Spyware Removal Guides, uninstall instructions

Puppyness Search Browser Hijacker

What is Puppyness Search?

Puppyness Search is rogue software categorized as a browser hijacker. It is endorsed as a tool for easy access to domestic canine-related content, however, following successful installation, Puppyness Search makes alterations to browser settings to promote puppyness.club (a fake search engine).

Puppyness Search also monitors users' browsing activity and collects sensitive information extracted from it, which makes this browser hijacker a serious privacy concern. Due to the dubious techniques used to proliferate Puppyness Search, it is classified as a Potentially Unwanted Application (PUA).

   
XAgentOSX RAT (Mac)

What is XAgentOSX RAT?

XAgentOSX is a Mac-specific malicious program, which is not to be confused with its Windows-targeting counterpart that was developed by an identical group. This malware is classified as a Remote Access Trojan (RAT). Trojans of this type allow remote access and control over an infected device.

They can have a wide variety of functionality, which enables likewise varied misuse of the compromised machine. XAgentOSX is classified as a piece of high-risk software, infections of which seriously endanger device and user safety.

   
NetWeirdRC RAT (Mac)

What is NetWeirdRC?

NetWeirdRC is a Remote Access Trojan (RAT), which works on macOS X 10.6 (and later), Windows, Linux, and Solaris operating systems. Typically, cyber criminals attempt to trick users into installing RATs so that they can gain control over computers remotely and perform various actions (install other malware, steal sensitive information, files, etc.).

Commonly, RATs do not appear in the list of active programs and running processes, and therefore they can be installed on the computer for an extended period of time without being detected.

   
DiskFixer Uwanted Application

What is DiskFixer?

DiskFixer software is endorsed as a tool for system optimization. It is allegedly capable of running various detection and removal processes, which supposedly enhance system performance. This program has a promotional website from which a free trial version can be downloaded and the full version purchased, however, DiskFixer also proliferates in other dubious ways.

Therefore, it is classed as a Potentially Unwanted Application (PUA).

   
Your Computer Is In Blocked State Scam

What is Your Computer Is In Blocked State?

"Your Computer Is In Blocked State" is a fake error message displayed by a malicious website that users often visit inadvertently - they are automatically redirected by various potentially unwanted programs (PUPs). These apps infiltrate systems without permission (the "bundling" method).

As well as causing unwanted redirects, PUPs deliver intrusive online advertisements and continually record various user-system information.

   
Tiktok-fun.com Ads

What is tiktok-fun[.]com?

tiktok-fun[.]com is an untrusted website designed to load dubious content or open other pages of this kind. Some examples of similar web pages include allfreshposts[.]com, hipermovies[.]icu and gdanstum[.]net

Note that most users do not visit these sites intentionally - they are usually opened by installed potentially unwanted applications (PUAs), via deceptive advertisements, or through other untrusted websites.

   
Auratab Browser Hijacker

What is Auratab?

Auratab is a browser hijacker endorsed as a tool supposedly capable of improving the browsing experience. In fact, it makes changes to browser settings to promote search.aura-search.net (a fake search engine). Most browser hijackers monitor users' browsing activity and this is likely to be the case with Auratab.

Typically, users install browser hijackers inadvertently and, due to this, they are also classified as Potentially Unwanted Applications (PUAs).

   
EasyWebPagePrint Toolbar

What is hp.myway.com?

Developed by Mindspark Interactive Network, EasyWebPagePrint is one of many browser hijackers, which promotes the address of a fake search engine (in this case, hp.myway.com) by changing certain browser settings. It also collects information relating to users' browsing habits.

Typically, users do not download or install browser hijackers intentionally and, for this reason, they are categorized as potentially unwanted applications (PUAs).

   
BG85 Ransomware

What is BG85 ransomware?

BG85 is a part of the Matrix ransomware family. It encrypts files using АЕS-256 and RSА-2048 encryption algorithms, renames them and creates a ransom message (within the "BG85_INFO.rtf" file) in all folders that contain encrypted.

BG85 renames encrypted files, by replacing their filenames with BobGreen85@criptext.com, a string of random characters, and appends the ".BG85" extension.

For example, it would rename a file called "1.jpg" to "[BobGreen85@criptext.com].3GULrhS5-JrDJHbaM.BG85", "2.jpg" to "[BobGreen85@criptext.com].4HIPtuO7-GdKVCmaL.BG85", and so on.

   
NOBAD Ransomware

What is NOBAD ransomware?

NOBAD is the name of a malicious program, belonging to the Matrix ransomware family. Systems infected with this malware experience data encryption and receive ransom demands for the decryption tools/software.

During the encryption process, files are retitled following this pattern - "[nobad@tutamail.com].[random_string].NOBAD", which consists of the cyber criminals' email address, a random character string and the ".NOBAD" extension.

For example, a file like "1.jpg" would appear as something similar to "[nobad@tutamail.com].g0cnH7IY-Cm67ExLK.NOBAD" - following encryption. After this process is complete, ransom notes - "#NOBAD_README#.rtf" - are dropped into affected folders.

   

Page 1082 of 2134

<< Start < Prev 1081 1082 1083 1084 1085 1086 1087 1088 1089 1090 Next > End >>
About PCrisk

PCrisk is a cyber security portal, informing Internet users about the latest digital threats. Our content is provided by security experts and professional malware researchers. Read more about us.

Malware activity

Global malware activity level today:

Medium threat activity

Increased attack rate of infections detected within the last 24 hours.

Virus and malware removal

This page provides information on how to avoid infections by malware or viruses and is useful if your system suffers from common spyware and malware attacks.

Learn about malware removal