Step-by-Step Malware Removal Instructions

Direct Search Online Browser Hijacker
Browser Hijacker

Direct Search Online Browser Hijacker

Direct Search Online is an application that hijacks browsers by changing certain settings to search.directsearchonline.com, the address of a fake search engine. In addition to changing browser settings, many browser hijackers gather browsing-related information. Most users download and install a

BAPATOH OFFSHORE SDN BHD Email Scam
Phishing/Scam

BAPATOH OFFSHORE SDN BHD Email Scam

"BAPATOH OFFSHORE SDN BHD" refers to a spam email campaign, a large-scale operation during which thousands of deceptive emails are sent. The scam messages distributed through this campaign are presented as quotation requests. These emails promote a phishing website disguised as an Excel document

JacksBot RAT
Trojan

JacksBot RAT

JacksBot (also known as jRAT) is the name of a Java-based Remote Access Trojan (RAT) that can be ported to run not only on Windows but also on macOS and Linux. Typically, cyber criminals distribute RATs to remotely monitor and control infected machines. Most of them use RATs to steal sensitive in

Amber (Phobos) Ransomware
Ransomware

Amber (Phobos) Ransomware

Amber is malicious software belonging to the Phobos ransomware family. This malware operates by encrypting data (locking files) to demand payment for decryption (access recovery). During the encryption process, affected files are renamed following this pattern: original filename, unique ID assign

Enfp Ransomware
Ransomware

Enfp Ransomware

Ransomware is a type of malicious software that prevents victims from accessing their files by encrypting them. Cyber criminals use malware of this type to extort money from their victims. They demand payment in exchange for a decryption tool. Enfp encrypts files and appends the ".enfp" extension

Hog Ransomware
Ransomware

Hog Ransomware

Hog ransomware is a type of malware that prevents victims from accessing or using their files by encrypting them. It keeps the files inaccessible unless victims join a Discord server. Hog also renames all encrypted files by appending the ".hog" extension to filenames. For example, "1.jpg" is rena

Secure (Thanos) Ransomware
Ransomware

Secure (Thanos) Ransomware

Secure is a variant of Thanos ransomware. Systems infected with this malware experience data encryption and users receive ransom demands for decryption tools/software. I.e., the files affected by this ransomware are rendered inaccessible, and victims are asked to pay to recover access to their da

LUCKY WINNER OF 1.5 MILLION DOLLARS Email Scam
Phishing/Scam

LUCKY WINNER OF 1.5 MILLION DOLLARS Email Scam

There are many different versions of email scams claiming to be from lottery organizers or other organizations, companies, and informing recipients that they have won a certain amount of money. Typically, scammers behind these emails attempt to trick unsuspecting recipients into providing persona

Track & Trace Email Scam
Phishing/Scam

Track & Trace Email Scam

"Track & Trace" refers to an email spam campaign. This term defines a mass-scale operation during which thousands of deceptive emails are sent. The messages distributed through this campaign target Dutch-speaking users. These emails claim that the recipients' tracking service is missing their