Virus and Spyware Removal Guides, uninstall instructions

Ninja Ransomware

What kind of malware is Ninja?

Discovered by Jakub Kroustek and belonging to the Dharma/Crysis malware family, Ninja is a malicious program classified as ransomware. Ninja operates by encrypting data and demanding ransom payments for decryption.

During the encryption process, all files are appended with a unique ID (generated individually for each victim), the developer's email address, and the ".ninja" extension.

Therefore, "1.jpg" might appear as a filename similar to "1.jpg.id-1E857D00.[ninja777@cock.li].ninja" and so on for all compromised files. Once this process is finished, a text file ("FILES ENCRYPTED.txt") is created on the desktop and a pop-up window is displayed.

   
LogicalSearch Adware (Mac)

What is LogicalSearch?

LogicalSearch is endorsed as an application for enhancing the browsing experience. It is supposedly capable of providing fast searches, improved search results and similar. In fact, it acts as adware and runs advertisement campaigns - delivering intrusive, unwanted, and even harmful ads.

Adware-type apps commonly have data tracking abilities, which they use to monitor and gather browsing-related information. Due to the dubious methods used to distribute LogicalSearch, it is classified as a Potentially Unwanted Application (PUA).

   
DoppelPaymer Ransomware

What is DoppelPaymer?

DoppelPaymer is ransomware-type malware designed to prevent victims from accessing their files by encryption. To regain access, victims are encouraged to pay cyber criminals a ransom. Research shows that criminals use DoppelPaymer in targeted attacks.

I.e., they target specific companies and/or industries. Criminals who have a specific target often seek to infiltrate (infect) the whole network (for example, all computers used within a particular company). This ransomware appends the ".locked" extension to the filename of each encrypted file.

For example, "1.jpg" becomes "1.jpg.locked". Each encrypted file receives an associated ransom message within a .txt file. For instance, the message for "1.jpg.locked" is contained within "1.jpg.readme2unlock.txt", and so on. Updated variants of this ransomware use ".doppeled" extension for encrypted files.

   
Free Bitcoin Private Key Tool Virus

What is Free Bitcoin Private Key Tool?

Discovered by Frost, "Free Bitcoin Private Key Tool" is a scam application used to proliferate Predator the Thief trojan-type malware.

It is promoted as a tool that supposedly grants users access to Bitcoin cryptocurrency stored in a Bitcoin wallet address. It allegedly does so by generating a private key to the Bitcoin address, thereby allowing entry and full control over it. Instead of producing easy profit, however, this scam infects systems with a high-risk, information-stealing trojan.

   
Notification-centar.com Ads

What is notification-centar[.]com?

notification-centar[.]com is virtually identical to windowsguidenews[.]com, robotornotcheckonline[.]club, reforeperc[.]pro, and many other websites. It redirects visitors to other rogue sites or displays dubious content.

Generally, people do not open notification-centar[.]com (or other websites of this kind) intentionally - browsers open them when potentially unwanted applications (PUAs) are installed. Typically, PUAs open dubious web pages, display advertisements, and collect data relating to browsing activity.

   
Peet Ransomware

What is Peet?

Discovered by Michael Gillespie, Peet is malicious software that is classified as ransomware. This malware is a part of the Djvu ransomware family. Like most programs of this type, Peet is designed to encrypt victims' files and keep them inaccessible unless they are recovered with decryption software and a key.

To obtain these, victims are required to pay ransoms to cyber criminals (Peet's developers).

Furthermore, Peet adds the ".peet" extension to the filename of each encrypted file. For example, "1.jpg" becomes "1.jpg.peet". Instructions about how to decrypt files and pay the ransom are provided within the "_readme.txt" text file, which can be found in each folder that contains encrypted data.

   
BlackRat Malware

What is BlackRat?

BlackRat is a remote access tool (RAT). Software of this type allows one computer to remotely access or control another computer.

RATs can be used legitimately, however, cyber criminals often employ them for malicious purposes. In such cases, these tools are known as remote access trojans. Being tricked into installation of BlackRat or other RATs can lead to serious problems. If this software was not installed intentionally, it should be uninstalled immediately.

   
Yourfine2upgradeultimate.best POP-UP Scam (Mac)

What is yourfine2upgradeultimate[.]best?

yourfine2upgradeultimate[.]best is a deceptive site. When opened, it claims that the visitor's Adobe Flash Player is supposedly outdated and needs to be updated. The updates this website offer are bogus and designed to proliferate untrustworthy content (e.g. fake Mac cleaners/optimizers, browser hijackers, adware, etc.).

Typically, products endorsed on these scam web pages are fake and nonoperational. Most users access yourfine2upgradeultimate[.]best and other similar web pages unintentionally, since they are redirected by intrusive advertisements or Potentially Unwanted Applications (PUAs) already present on the device.

   
Windowsguidenews.com Ads

What is windowsguidenews[.]com?

When visitors arrive at windowsguidenews[.]com, it presents dubious content or opens a number of other untrustworthy websites. It functions like many other rogue websites such as, for example, reforeperc[.]pro, asonsbirthi[.]pro, and pushstack[.]co.

Most windowsguidenews[.]com visitors do not open this website address intentionally - they are redirected to it by potentially unwanted applications (PUAs) installed on their browsers or operating systems. Furthermore, PUAs are usually designed to display various advertisements and collect information relating to users' browsing habits.

   
Full System Care Unwanted Application

What is Full System Care?

Full System Care is advertised as software that cleans, optimizes, and improves computer performance. In fact, this program is distributed through the download and/or installation set-ups of other programs. People often download and install software of this type unintentionally. Therefore, Full System Care is categorized as a potentially unwanted application (PUA).

   

Page 1310 of 2137

<< Start < Prev 1301 1302 1303 1304 1305 1306 1307 1308 1309 1310 Next > End >>
About PCrisk

PCrisk is a cyber security portal, informing Internet users about the latest digital threats. Our content is provided by security experts and professional malware researchers. Read more about us.

Malware activity

Global malware activity level today:

Medium threat activity

Increased attack rate of infections detected within the last 24 hours.

Virus and malware removal

This page provides information on how to avoid infections by malware or viruses and is useful if your system suffers from common spyware and malware attacks.

Learn about malware removal