Virus and Spyware Removal Guides, uninstall instructions

Searchiing.com Redirect (Mac)

What is searchiing.com?

searchiing.com is a bogus search engine. These fake search engines are usually promoted by Potentially Unwanted Applications (PUAs) categorized as browser hijackers. This software operates by making modifications to browsers and monitoring users' browsing activity. Additionally, PUAs do not need explicit user consent to be installed onto devices.

   
EngageSearch Adware (Mac)

What is EngageSearch?

EngageSearch is an adware-type application with browser hijacker traits. This app is designed to run intrusive advertisement campaigns, make modifications to browsers and promote fake search engines. EngageSearch promotes Safe Finder via akamaihd.net in this manner.

Most software within the adware and browser hijacker categories has data tracking capabilities, which are used to monitor users' browsing activity. Additionally, due to the dubious methods employed to proliferate EngageSearch, it is classified as a Potentially Unwanted Application (PUA).

   
RAGA Ransomware

What is RAGA ransomware?

RAGA is a ransomware-type malicious program. Systems infected with this malware have their data encrypted and users receive ransom demands for decryption tools/software.

During the encryption process, all compromised files are renamed following this pattern: original filename, unique ID assigned to the victim, cyber criminals' email address and the ".RAGA" extension. For example, a file such as "1.jpg" would appear as something similar to "1.jpg.[E38D7F03].[tommyraga@aol.com].RAGA" following encryption.

After this process is complete, ransom messages within the "readme-warning.txt" file are dropped into affected folders.

   
AL8G Ransomware

What is AL8G ransomware?

Discovered by xiaopao, AL8G is a malicious program belonging to the Matrix ransomware family. The malware operates by encrypting data and demanding payment for decryption tools/software.

During the encryption process, all affected files are renamed following this pattern: "[AlanRed@criptext.com].[random-string].AL8G", which comprises the cyber criminals' email address, random character string and the ".AL8G" extension.

For example, a file like "1.jpg" would appear as something similar to "[AlanRed@criptext.com].ZPtF762C-lcqg6mhu.AL8G" following encryption. Once this process is finished, ransom-demand messages within "Readme_AL8G.rtf" files are dropped into compromised folders.

   
StreamItSearch Browser Hijacker

What is StreamItSearch?

StreamItSearch is a browser hijacker designed to promote streamit-search.com. Following successful infiltration, this piece of software modifies browser settings to promote a fake search engine (streamit-search.com). Furthermore, StreamItSearch has data tracking capabilities that are used to monitor browsing activity.

Since most users download/install StreamItSearch unintentionally, it is also classified as a Potentially Unwanted Application (PUA).

   
FlowEncryption Ransomware

What is flowEncryption ransomware?

flowEncryption is malicious software, classified as ransomware. Systems infected with this malware have their data encrypted and users receive ransom demands for decryption. During encryption process, filenames of affected files are appended with the ".flowEncryption" extension.

For example, a file named something like "1.jpg" would appear as "1.jpg.flowEncryption" following encryption. Once this process is complete, a pop-up window is displayed containing a brief ransom-demand message.

   
SportsHDSearchs Browser Hijacker

What is SportsHDSearchs?

SportsHDSearch is dubious software categorized as a browser hijacker. Following successful infiltration, it makes modifications to browser settings to promote sportshdearchs.com, a bogus search engine. Additionally, SportsHDSearchs has data tracking capabilities, which are employed to monitor users' browsing habits.

Due to the dubious techniques used to proliferate this browser hijacker, it is also classified as a Potentially Unwanted Application (PUA).

   
EG83 Ransomware

What is EG83 ransomware?

Discovered by xiaopao, EG83 is a malicious program that belongs to the Matrix ransomware family. Systems infected with this malware experience data encryption and ransom demands are made for decryption tools.

During the encryption process, the filenames of affected files are renamed according to this pattern: "[Evagreps83@yahoo.com].[random-string].EG83", which consists of the cyber criminals' email address, random character string and the ".EG83" extension.

For example, a file originally named "1.jpg" would appear as something similar to "[Evagreps83@yahoo.com].dqhJjlgS-xSmnD7U0.EG83" following encryption. After this process is complete, ransom messages within "!EG83_INFO!.rtf" files are dropped into compromised folders.

   
BinarySignSearch Adware (Mac)

What is BinarySignSearch?

BinarySignSearch is a rogue application classified as adware and possessing browser hijacker traits. This app operates by delivering intrusive ad campaigns and making alterations to browser settings to promote fake search engines. Most adware-type apps and browser hijackers have data tracking capabilities, which are employed to monitor users' browsing activity.

It is highly likely that BinarySignSearch has such capabilities as well. Since most users download/install this piece of software unintentionally, it is classified as a Potentially Unwanted Application (PUA). One of the dubious methods used to distribute BinarySignSearch is via fake Adobe Flash Player updates.

Bogus updaters/installers also proliferate malware (e.g. Trojans, ransomware, etc.).

   
Alpha865qqz Ransomware

What is Alpha865qqz ransomware?

Alpha865qqz is malicious software mimicking GlobeImposter ransomware, however, it actually belongs to the Maoloa ransomware family. Systems infected with this malware have their data encrypted and users receive ransom demands for decryption tools/software.

During the encryption process, all affected files are appended with the ".Globeimposter-Alpha865qqz" extension. For example, a file originally named "1.jpg" would appear as "1.jpg.Globeimposter-Alpha865qqz" following encryption. After this process is complete, ransom messages within "HOW TO BACK YOUR FILES.exe" files are dropped into every compromised folder.

   

Page 1112 of 2132

<< Start < Prev 1111 1112 1113 1114 1115 1116 1117 1118 1119 1120 Next > End >>
About PCrisk

PCrisk is a cyber security portal, informing Internet users about the latest digital threats. Our content is provided by security experts and professional malware researchers. Read more about us.

Malware activity

Global malware activity level today:

Medium threat activity

Increased attack rate of infections detected within the last 24 hours.

Virus and malware removal

This page provides information on how to avoid infections by malware or viruses and is useful if your system suffers from common spyware and malware attacks.

Learn about malware removal