Virus and Spyware Removal Guides, uninstall instructions

Lokas Ransomware

What is Lokas?

Lokas is yet another ransomware from Djvu family. It was firstly discovered by malware researcher Michael Gillespie. This malware is designed to lock (encrypt) victim's data and to make ransom demands. While encrypting, Lokas appends each filename with ".lokas" extension.

For instance, a file named "sample.jpg" would be renamed to "sample.jpg.lokas" and so forth. Aside from encrypting, Lokas creates a text file ("_readme.txt") and drops a copy in every existing folder.

   
Nitroflare.com Suspicious Website

What is nitroflare[.]com?

nitroflare[.]com is a rogue website that supposedly provides free file hosting services. Judging on the appearance alone, nitroflare[.]com may seem appropriate and handy. Nevertheless, developers monetize this site by using rogue advertising networks which promote unreliable (potentially malicious) websites.

Moreover, this site is full of software cracks that are available for download and, as we already know, most of cracking tools are fake and cyber criminals use them to spread high-risk malware infections.

   
Approvedresults.com Redirect

What is approvedresults.com?

approvedresults.com is a rogue website presented as high-end web search engine that significantly enhances web browsing experience by generating improved search results. Judging on the appearance alone, approvedresults.com actually seems appropriate and handy.

However, it is worth mentioning that this website is promoted using various browser-hijacking extensions and download/installation setups. Moreover, fake web search engines like approvedresults.com usually gather various information relating to user's web browsing activity.

   
Get Coupons Now Browser Hijacker

What is Get Coupons Now?

Get Coupons Now is a rogue application that supposedly saves time and money by providing discount coupons for various online shops.

Judging on appearance alone, Get Coupons Now may seem legitimate and useful, however, it is categorized as a potentially unwanted application (PUA) and a browser hijacker. The main reasons for these negative associations are stealth installation without users' consent, promotion of a fake search engine, and data tracking.

   
Basilisque Locker Ransomware

What is Basilisque Locker?

Basilisque Locker is high-risk ransomware designed to encrypt data and make ransom demands. Note that Basilisque Locker typically targets server devices rather than home computers. During encryption, Basilisque Locker renames each file to a random string and appends the ".basilisque@protonmail_com" extension.

For example, "1.jpg" might be renamed to a filename such as "bnVldm9zIGNvbG9yZXMgYWR1bHRvcy5wZGY=.basilisque@protonmail_com". Encrypted data immediately becomes unusable.

Additionally, Basilisque Locker generates a text file ("HOW_TO_DECRYPT.txt") and stores it in each folder containing encrypted files.

   
ERIS Ransomware

What is ERIS?

Discovered by Michael Gillespie, ERIS is a ransomware-type malicious program. Cyber criminals who create malware of this type use it to encrypt other users' files and extort money by forcing them to pay a ransom. Like most programs of this type, ERIS renames all encrypted files and changes their extensions to ".ERIS".

For example, "1.jpg" becomes "1.jpg.ERIS". It also creates a text file called "@ READ ME TO RECOVER FILES @.txt" containing a ransom message with information about how to obtain a decryption tool. Other variants of this ransomware use ".TABGH" extension for encrypted files.

   
Cezor Ransomware

What is Cezor?

Belonging to the Djvu ransomware family, Cezor is a high-risk ransomware infection discovered by Petrovic. Once infiltrated, Cezor encrypts most stored files and appends filenames with the ".cezor" extension (e.g., "sample.jpg" is renamed to "sample.jpg.cezor").

Encrypted data immediately becomes unusable. Once encryption is complete, Cezor generates a text file ("_readme.txt") and stores a copy in every existing folder.

   
Nanoadexchange.com Ads

What is nanoadexchange[.]com?

nanoadexchange[.]com is a URL address used by various rogue advertising networks, which typically employ deceptive applications and websites.

Therefore, users are redirected to this website when their computers are infected with potentially unwanted applications (PUAs) or adware, or when they visit dubious websites. Note that nanoadexchange[.]com also redirects to other dubious websites.

   
Astaroth Trojan

What is Astaroth?

Astaroth is high-risk trojan-type virus. It is typically distributed using spam email campaigns. Criminals send hundreds of thousands of emails that contain deceptive messages encouraging users to open attached files (Microsoft Office documents). Once opened, these files run commands that inject Astaroth into the system.

Following infiltration, Astaroth injects other malicious apps. At time of research, it was used to proliferate a keylogger designed to steal personal data, however, Astaroth is also used to proliferate other malware.

   
Kissanime Suspicious Website

What is Kissanime?

The Kissanime website provides free online anime videos, which can be viewed on mobile and desktop devices. It is also possible to download them in various formats and provide different viewing experiences. Note, however, that this is an untrustworthy site that uses rogue advertising networks.

Therefore, it contains dubious ads that lead to rogue, deceptive websites. Do NOT visit this site or use its services. Note also that Kissanime offers downloads illegally.

   

Page 1398 of 2135

<< Start < Prev 1391 1392 1393 1394 1395 1396 1397 1398 1399 1400 Next > End >>
About PCrisk

PCrisk is a cyber security portal, informing Internet users about the latest digital threats. Our content is provided by security experts and professional malware researchers. Read more about us.

Malware activity

Global malware activity level today:

Medium threat activity

Increased attack rate of infections detected within the last 24 hours.

Virus and malware removal

This page provides information on how to avoid infections by malware or viruses and is useful if your system suffers from common spyware and malware attacks.

Learn about malware removal