Virus and Spyware Removal Guides, uninstall instructions

Madek Ransomware

What is Madek?

Madek is a high-risk ransomware infection discovered by Michael Gillespie and belonging to Djvu, a family of ransomware-type infections.

Immediately after infiltration, Madek compromises stored data by encryption, thereby rendering it unusable. In addition, Madek renames each file by adding the ".madek" appendix (e.g., "sample.jpg" is renamed to "sample.jpg.madex"). Once encryption is complete, Madek generates a text file ("_readme.txt") and stores a copy in all existing folders.

   
Gehad Ransomware

What is Gehad?

First discovered by Michael Gillespie and belonging to the Djvu ransomware family, Gehad is a high-risk infection designed to encrypt data and keep it in that state unless a ransom is paid.

During encryption, Gehad appends each filename with the ".gehad" extension (hence its name). After successful encryption, Gehad generates a "_readme.txt" file and stores a copy in every existing folder.

   
Extenbro Trojan

What is Extenbro?

Extenbro is a trojan-type application designed to modify DNS system settings in the IPv4 protocol. Cyber criminals proliferate this malware using the "bundling" method, and thus Extenbro infiltrates computers during installation of other programs.

   
Hidden Bee Malware

What is Hidden Bee?

Hidden Bee (also known as Hidden Mellifera) is a trojan-type infection designed to mine cryptocurrency. Therefore, it diminishes system performance. This malware infiltrates computers without users' consent and research shows that cyber criminals proliferate Hidden Bee using the Popcash advertising network and Underminer Exploit Kit (EK).

   
1BTC Ransomware

What is 1BTC?

First discovered by Jakub Kroustek, 1BTC is yet another variant of high-risk ransomware called Dharma. As with its predecessor, 1BTC encrypts most stored files and appends each filename with the victim's unique ID, developer's email address, and ".1BTC" extension.

For example, "sample.jpg" might be renamed to a filename such as "sample.jpg.id-1E857D00.[btcdecoding@foxmail.com].1BTC". Following successful encryption, 1BTC opens a pop-up window and stores the "RETURN FILES.txt" text file on the desktop.

   
V6cye Ransomware

What is V6cye?

First discovered by Michael Gillespie, V6cye is a ransomware-type infection that belongs to the Snatch ransomware family. This malware is designed to encrypt data and make ransom demands. During encryption, V6cye adds the ".v6cye" extension to each filename. Additionally, V6cye stores the "RESTORE_V6CYE_FILES.txt" text file on the desktop.

   
Berosuce Ransomware

What is Berosuce?

Discovered by Michael Gillespie, Berosuce is yet another ransomware infection from the Djvu family. As with other malware from this family, Berosuce encrypts most data stored on the system. It also appends filenames with the ".berosuce" extension (e.g., "sample.jpg" is renamed to "sample.jpg.berosuce").

Encrypted data immediately becomes unusable. After successful encryption, Berosuce generates a text file named "_readme.txt" and stores copies in all existing folders.

   
Gloyah.net Ads

What is gloyah[.]net?

gloyah[.]net is related to adf.ly, a legitimate website that provides a URL-shortening service. The users of this service are paid for shortening URLs and promoting them, since each visitor is presented with a five-second advertisement before the target (website) is reached. Note that gloyah[.]net is one of the websites promoted by adf.ly

   
Spaces.app Adware (Mac)

What is Spaces?

Identical to Spotlight.app, Spaces (also known as Spaces.app) is a rogue adware-type application that promotes the searchbaron.com fake search engine. This application monitors web browsing activity and redirects users to searchbaron.com when they enter a search query. Spaces usually infiltrates computers without users' consent.

   
Actor Ransomware

What is Actor?

Belonging to the Phobos ransomware family, Actor is high-risk malware discovered by GrujaRS. After successful infiltration, Actor encrypts most stored files and appends filenames with the ".actor" extension, the developer's email address, and the victim's unique ID.

For example, "1.jpg" might be renamed to a filename such as "1.jpg.id[1E857D00-2224].[zoye1596@msgden.net].actor". Once data is encrypted, Actor generates two files ("info.txt" and "info.hta"), storing them on the desktop.

   

Page 1384 of 2126

<< Start < Prev 1381 1382 1383 1384 1385 1386 1387 1388 1389 1390 Next > End >>
About PCrisk

PCrisk is a cyber security portal, informing Internet users about the latest digital threats. Our content is provided by security experts and professional malware researchers. Read more about us.

Malware activity

Global malware activity level today:

Medium threat activity

Increased attack rate of infections detected within the last 24 hours.

Virus and malware removal

This page provides information on how to avoid infections by malware or viruses and is useful if your system suffers from common spyware and malware attacks.

Learn about malware removal