Step-by-Step Malware Removal Instructions

USAA Email Scam
Phishing/Scam

USAA Email Scam

Commonly, phishing emails such as this example are used to trick recipients into providing sensitive information such as credit card details, login credentials (emails, usernames, passwords) or other details, which could be misused for malicious purposes. Generally, cyber criminals attempt to tri

Abaddon RAT
Trojan

Abaddon RAT

Abaddon is a Remote Access Trojan (RAT) that receives commands via Discord. I.e., this RAT uses Discord as its Command and Control (C2) server. Additionally, Abaddon has a ransomware feature and could be used to execute commands to encrypt files. Therefore, cyber criminals might use this malware

Iiss Ransomware
Ransomware

Iiss Ransomware

Belonging to the Djvu ransomware family, Iiss encrypts files, modifies their filenames by appending its extension and creates a ransom message in all folders that contain encrypted files. It renames encrypted files by appending the ".iiss" extension to filenames. For example, "1.jpg" is renamed t

Take Mytab Browser Hijacker
Browser Hijacker

Take Mytab Browser Hijacker

Take mytab is a browser hijacker. Following successful infiltration, this piece of rogue software changes browser settings to promote keysearchs.com (a fake search engine). Rogue search engines cannot provide unique results, and so they redirect to genuine sites. Where Take mytab redirects to dep

AllStreamSearch Browser Hijacker
Browser Hijacker

AllStreamSearch Browser Hijacker

Like most browser hijackers, AllStreamSearch promotes a fake search engine. In this case, by changing certain browser settings to allstreamsearch.com. It also records data relating to users' browsing habits. Commonly, users download and install browser hijackers inadvertently and, therefore, apps

_encrypted (RRansom) Ransomware
Ransomware

_encrypted (RRansom) Ransomware

Discovered by xiaopao, _encrypted (RRansom) is a malicious program classified as ransomware. Systems infected with this malware experience data encryption and users receive ransom demands for decryption. During the encryption process, files are appended with the "_encrypted" extension. For exampl

Evil (Jigsaw) Ransomware
Ransomware

Evil (Jigsaw) Ransomware

Evil is malware belonging to the Jigsaw ransomware family. It is designed to encrypt victims' files, modify their filenames and display a pop-up window (containing a ransom message). Evil renames files by appending the ".evil" extension. For example, "1.jpg" is renamed to "1.jpg.evil", "2.jpg" to

Cybersearch.xyz Redirect (Mac)
Mac Virus

Cybersearch.xyz Redirect (Mac)

Cyber Search is a browser hijacker which changes certain browser settings to cybersearch.xyz, adds the "Managed by your organization" feature to Google Chrome browsers, and collects private, sensitive information. Generally, users download and install apps such as Cyber Search (browser hijackers

PDFConverterSearch4Free Browser Hijacker
Browser Hijacker

PDFConverterSearch4Free Browser Hijacker

PDFConverterSearch4Free is rogue software categorized as a browser hijacker. It operates by making changes to browser settings to promote pdfconvertersearch4free.com (a fake search engine). Additionally, most browser hijackers have data tracking capabilities, which are employed to monitor users' b

Szymekk Ransomware
Ransomware

Szymekk Ransomware

Discovered by GrujaRS, Szymekk is a malicious program and a new variant of Cobra Locker ransomware. Following successful infiltration, this malware encrypts data and locks the device's screen in order to demand ransoms for decryption and restoration of access. During the encryption process, all a