Virus and Spyware Removal Guides, uninstall instructions

HermesLookup Adware (Mac)

What is HermesLookup?

HermesLookup is a rogue application categorized as adware, which also possesses browser hijacker traits. Following successful infiltration, this app runs intrusive advertisement campaigns (i.e., delivers unwanted and harmful ads), modifies browsers and promotes fake search engines.

Additionally, HermesLookup is likely to have data tracking capabilities, which are employed to monitor users' browsing activity. Due to the dubious methods used to proliferate HermesLookup, it is also classified as a Potentially Unwanted Application (PUA). One of the dubious techniques used to proliferate this application is via fake Adobe Flash Player updates.

Note that bogus updaters/installers commonly distribute Trojans, ransomware and other malware.

   
UniversalWebResults Adware (Mac)

What is UniversalWebResults?

UniversalWebResults (also known as UniversalWebResult) is designed to feed users with various advertisements. It also functions as a browser hijacker and changes certain browser settings to promote the address of a fake search engine. Apps of this type (adware, browser hijackers) also collect browsing data.

Research shows that UniversalWebResults is distributed by using a fake Adobe Flash Player and, therefore, people often download and install this app unintentionally. For these reasons, UniversalWebResults is also categorized as a potentially unwanted application (PUA).

   
DragonCyber Ransomware

What is DragonCyber?

DragonCyber belongs to a ransomware family called Jigsaw. Like most programs of this type, it encrypts files, modifies filenames and generates a ransom message. DragonCyber renames all encrypted files by appending the ".dc" extension to filenames. For example, it renames "1.jpg" to "1.jpg.dc", "2.jpg" to "2.jpg.dc", and so on.

This ransomware also displays a pop-up window, which contains instructions about how to recover data that was encrypted by it.

   
Cisco AnyConnect Virus

What is "Cisco AnyConnect Virus"?

"Cisco AnyConnect Virus" is a generic term used to describe unwanted or malicious content distributed under the guise of content relating to the Cisco AnyConnect application. Cisco AnyConnect is a unified security endpoint agent that delivers multiple security services for enterprise protection.

It also provides the visibility and control necessary to identify users and devices that are accessing the extended enterprise. Therefore, it is designed as a tool to provide secure access to remote workers. The untrusted/malicious content distributed under the guise of this product/company is in no way connected to the legitimate Cisco Systems, Inc. company.

   
Microsoft Lync Virus

What is Microsoft Lync?

Microsoft Lync (and Office Communicator) is a former name of Skype for Business, a popular instant messaging application. Research shows that there are a number of fake, deceptive Microsoft Lync installers designed to distribute unwanted, malicious applications.

This is not the first time cyber criminals have used the name of well-known, legitimate products or services for malicious purposes. If the installer for Microsoft Lync/Skype for Business is promoted on an unofficial website, this is not the legitimate Microsoft product and is likely to be potentially unwanted or even malicious software.

   
MassLogger Virus

What is MassLogger?

MassLogger (also known as Mass Logger) is a malicious program classified as a keylogger and 'stealer malware'. The primary purpose of MassLogger is data extraction (i.e., it steals information). The data targeted by this malware depends on the cyber criminals using it.

Since this keylogger/stealer is available for purchase, the threat actors operating it can be varied, unconnected to one another, and have different goals. This program is highly dangerous software, and therefore is it crucial to remove MassLogger infections immediately.

   
Australian Government Department Of Health Email Virus

What is "Australian Government Department of Health Email Virus"?

Cyber criminals often attempt to trick users into installing malware on their computers through spam campaigns. They send emails that contain malicious attachments or website links designed to download malicious files. Their main goal is to deceive recipients into opening the rogue file, which then installs malware.

Commonly, they disguise their emails as important, and are seemingly sent from well-known, official companies, etc. In this case, they send emails disguised as messages from the Australian Government Department of Health and include attachments designed to install a Remote Access Trojan (RAT) called NanoCore.

   
Thediseasetracker.com Ads

What is thediseasetracker[.]com?

thediseasetracker[.]com is a rogue web page similar to zpredir1.combiz-4u.combehavingsoping.club and thousands of others. It provides visitors with dubious content and/or redirects them to other untrusted or even malicious sites.

Typically, thediseasetracker[.]com and similar websites are accessed via redirects caused by intrusive advertisements and Potentially Unwanted Applications (PUAs). These rogue apps do not need explicit user consent to be installed onto devices. PUAs cause redirects, deliver intrusive ad campaigns and collect browsing-related data.

   
Precious Bible Browser Hijacker

What is Precious Bible browser hijacker?

Precious Bible is a browser hijacker endorsed as a tool capable of providing daily bible verses and easy access to related content. In fact, this rogue software modifies browsers to promote preciousbible.com (a fake search engine). Additionally, Precious Bible has data-tracking capabilities, which are employed to monitor users' browsing habits.

Due to the dubious methods used to proliferate Precious Bible, it is also classified as a Potentially Unwanted Application (PUA).

   
Qensvlcbymk Ransomware

What is Qensvlcbymk?

Discovered by GrujaRS, Qensvlcbymk is a malicious program belonging to the Snatch ransomware family. Qensvlcbymk ransomware operates by encrypting data and demanding payment for decryption. During the encryption process, all compromised files are appended with the ".qensvlcbymk" extension.

For example, a file like "1.jpg" would appear as "1.jpg.qensvlcbymk" following encryption. Once this process is complete, a ransom message ("HOW TO RESTORE YOUR FILES.TXT") is dropped into every affected folder.

   

Page 1135 of 2106

<< Start < Prev 1131 1132 1133 1134 1135 1136 1137 1138 1139 1140 Next > End >>
About PCrisk

PCrisk is a cyber security portal, informing Internet users about the latest digital threats. Our content is provided by security experts and professional malware researchers. Read more about us.

Malware activity

Global malware activity level today:

Medium threat activity

Increased attack rate of infections detected within the last 24 hours.

Virus and malware removal

This page provides information on how to avoid infections by malware or viruses and is useful if your system suffers from common spyware and malware attacks.

Learn about malware removal