Step-by-Step Malware Removal Instructions

$500 Amazon Gift Card! POP-UP Scam
Phishing/Scam

$500 Amazon Gift Card! POP-UP Scam

Scammers behind this website attempt to trick visitors into believing that, if they complete a survey, they will receive a $500 Amazon gift card. Neither this nor other similar web pages are legitimate or trustworthy. Commonly, scammers behind these pages ask users to provide personal information

Locks (Xorist) Ransomware
Ransomware

Locks (Xorist) Ransomware

Locks encrypts data, modifies the filename of each encrypted file, and generates two ransom messages. It renames files by appending the ".locks" extension to filenames. For example, "1.jpg" is renamed to "1.jpg.locks", "2.jpg" to "2.jpg.locks", and so on. Locks creates "HOW TO DECRYPT FILES.txt"

Funcy Web Browser Hijacker
Browser Hijacker

Funcy Web Browser Hijacker

Funcy Web is classified as a browser hijacker because it promotes a fake search engine (quicknewtab.com) and directs users to it without their permission. It also collects browsing history details and possibly other data. Note that browser hijackers such as Funcy Web are not often installed by us

OperativeMachine Adware (Mac)
Mac Virus

OperativeMachine Adware (Mac)

OperativeMachine is classified as adware because it generates advertisements. Note that it also functions as a browser hijacker, modifying browser settings to promote a fake search engine. Typically, users do not download or install apps such as OperativeMachine intentionally and, for this reas

BTC Giveaway Scam
Phishing/Scam

BTC Giveaway Scam

Some internet scams invite people to send a specific Bitcoin sum to a provided wallet or via a QR code, and promise to return double the amount of cryptocurrency. People who trust these scams receive nothing in return and simply lose the cryptocurrency that they send. This giveaway scam is no dif

Babuk Locker Ransomware
Ransomware

Babuk Locker Ransomware

Babuk Locker is ransomware that creates the "How To Restore Your Files.txt" file (ransom message) in all folders that contain encrypted files and renames the files by appending the ".__NIST_K571__" extension. For example, "1.jpg" is renamed to "1.jpg.__NIST_K571__", "2.jpg" to "2.jpg.__NIST_K571__

GoSearch22 Virus (Mac)
Mac Virus

GoSearch22 Virus (Mac)

GoSearch22 is a potentially unwanted application (PUA) that functions as adware and generates advertisements. It belongs to the family of adware-type apps called Pirrit. Apps such as GoSearch22 are often downloaded and installed by users intentionally, and are thus classified as 'potentially unw

Xenon Stealer
Trojan

Xenon Stealer

Xenon is an information stealer, which can be purchased from hacker forums for USD$150 or $80 (depending on the subscription plan). This type of malware resides in an infected device, collects data and sends it to the attacker. Victims are often not aware of Xenon's presence until particular symp

Ziggy Ransomware
Ransomware

Ziggy Ransomware

Ziggy blocks access to files by encryption, renames each encrypted file, and creates the "## HOW TO DECRYPT ##.exe" executable file (ransom message) in all folders that contain encrypted files. This ransomware renames files by adding the victim's ID, lilmoon1@criptext.com email address, and appen

WormLocker Ransomware
Ransomware

WormLocker Ransomware

Discovered by S!Ri, WormLocker ransomware encrypts files, displays a ransom message in full screen mode, and plays the on-screen ransom message through the system speakers. The ransom message contains details such as cost of decryption key, a countdown timer, input field for a decryption code, ema