Virus and Spyware Removal Guides, uninstall instructions

Biggerupdateforvideos.best POP-UP Scam (Mac)

What is biggerupdateforvideos[.]best?

biggerupdateforvideos[.]best is a deceptive website used to trick visitors into installing unwanted software through a fake Adobe Flash Player installer. Research shows that biggerupdateforvideos[.]best downloads a file that installs two potentially unwanted applications (PUAs): Advanced Mac Tuneup and SearchItNow.

It also promotes the address of a fake search engine (searchbaron.com). We strongly recommend against trusting biggerupdateforvideos[.]best or opening any files that can be downloaded from this site.

   
.harma (Ouroboros) Ransomware

What is .harma (Ouroboros)?

Discovered by malware researcher S!Ri, .harma (Ouroboros) is a ransomware-type malicious program belonging to the Ouroboros malware family. Systems infected with this software have data encrypted and victims receive ransom demands for decryption tools/software.

During the encryption process, all affected files are renamed with the ".harma" extension, which has been used by other ransomware from the Dharma family.

To elaborate on how files appear following encryption, a filename like "1.jpg" would appear as "1.jpg.harma". After this process is complete, two files ("INFO.exe" and "ReadMe.txt") containing the ransom messages are stored on the desktop.

   
My Package Homepage Browser Hijacker

What is My Package Homepage?

The My Package Homepage app supposedly provides a package tracking service, however, this rogue software is categorized as a browser hijacker, a potentially unwanted application (PUA) that promotes a fake search engine (search.hmypackagehomepage.com) and gathers browsing data.

Like most browser hijackers, My Package Homepage promotes its associated URL (in this case, search.hmypackagehomepage.com) by changing browser settings. Note that people often download and install apps of this type inadvertently.

   
Search.doc2pdfsearch.com Redirect (Mac)

What is search.doc2pdfsearch.com?

Practically identical to doctopdfsupreme.com, search.pricklybears.com, and many others, search.doc2pdfsearch.com is a fake search engine and promoted by the DOC2PDF Convert browser hijacker. These rogue applications modify browsers and restrict/deny access to settings.

Additionally, most browser hijackers have data tracking abilities, which are employed to record browsing-related information. Due to the dubious methods used to distribute DOC2PDF Convert, it is also classified as a Potentially Unwanted Application (PUA).

   
Doctopdfsupreme.com Redirect (Mac)

What is doctopdfsupreme.com ?

doctopdfsupreme.com is a fake search engine which is promoted through a potentially unwanted application (PUA), a browser hijacker called docpdfsupreme (or docpdfsupreme - Search the web and convert PDF).

Typically, browser hijackers promote fake search engines by changing certain browser settings, however, most also gather details relating to users' browsing activities. Apps of this type are classified as PUAs, since people usually download and install them inadvertently.

   
Your computer hacked! Email Virus

What is "Your computer hacked!"?

Scammers behind this email claim that they have hacked the computer and taken control of the recipient's personal and financial data.

They threaten to delete the data unless the recipient pays a specific ransom amount. Extortion, however, is not their primary goal. They also attempt to trick people into opening a malicious attachment, which installs a malicious program called Emotet, a Trojan designed to steal sensitive information and spread other malware.

   
TRSomware Is Back Ransomware

What is TRSomware is back?

TRSomware is a new variant of MMDecrypt ransomware. It operates by encrypting the data of infected systems so that criminals can demand payment for decryption tools/software. During encryption, filenames are appended with the ".TRSomware[is_back__New-Algorithm__By_MaMo434376]" extension.

For example, "1.jpg" would appear as "1.jpg.TRSomware[is_back__New-Algorithm__By_MaMo434376]" following encryption. Once this process is finished, a text file called "Beni Oku!!!.txt" ("Read Me!!!") is stored on the desktop. The file contains a ransom message in Turkish.

   
Devos Ransomware

What is Devos?

Devos is a part of the Phobos ransomware family. Like most programs of this type, Devos blocks access to files by encryption, changes filenames and provides victims with instructions about how to recover their files. This ransomware renames all encrypted files by adding the victim's ID, developer's email address and appending the ".Devos" extension to filenames.

For example, it renames "1.jpg" to "1.jpg.id[1E857D00-2654].[qq1935@mail.fr].Devos", and so on. It provides victims with two ransom messages: one in a pop-up window ("info.hta" file) and another in a text file named "info.txt".

   
Centerplaceofupgrade.pro POP-UP Scam (Mac)

What is centerplaceofupgrade[.]pro?

centerplaceofupgrade[.]pro is a deceptive site promoting a fake Adobe Flash Player updater scam. The web page claims that the plug-in is outdated and recommends installation of the latest updates. Note that bogus software updates are typically used to proliferate nonoperational, untrustworthy and malicious content.

I.e., they can spread various Potentially Unwanted Applications (PUAs) such as adware and browser hijackers, and even malware (e.g. ransomware, trojans, etc.). Few people visit scam pages intentionally - most are redirected by intrusive ads or PUAs already installed on the system.

   
.777 (njkwe RaaS) Ransomware

What is .777 (njkwe RaaS)?

.777 (njkwe RaaS) belongs to the Paradise ransomware family and was discovered by S!Ri. This ransomware encrypts data, renames all files by adding a string containing the operator's number, victim's personal ID and appending the ".777" extension to filenames. For example, it renames "1.jpg" to "1.jpg._911_{oIHdJK}.777", and so on.

Note that there is also another variant of .777 (njkwe RaaS), which renames files by adding "_babyfromparadise_{victim's_ID}.777" to filenames. For example, it renames "1.jpg" to "1.jpg_babyfromparadise_{oIHdJK}.777", and so on.

This ransomware creates the "---==%$$$OPEN_ME_UP$$$==---.txt" text file, also a ransom message.

   

Page 1277 of 2152

<< Start < Prev 1271 1272 1273 1274 1275 1276 1277 1278 1279 1280 Next > End >>
About PCrisk

PCrisk is a cyber security portal, informing Internet users about the latest digital threats. Our content is provided by security experts and professional malware researchers. Read more about us.

Malware activity

Global malware activity level today:

Medium threat activity

Increased attack rate of infections detected within the last 24 hours.

Virus and malware removal

This page provides information on how to avoid infections by malware or viruses and is useful if your system suffers from common spyware and malware attacks.

Learn about malware removal