Step-by-Step Malware Removal Instructions

Email Quarantine Scam
Phishing/Scam

Email Quarantine Scam

"Email Quarantine" refers to a phishing spam email campaign. The term "spam campaign" is used to define a mass-scale operation, during which thousands of deceptive emails are sent. The messages distributed through the "Email Quarantine" campaign claim that users have several incoming emails, which

National Lottery Email Scam
Phishing/Scam

National Lottery Email Scam

Scammers behind lottery scams send notifications stating that the recipient has won some money or another prize. Typically, they send such notifications via email, text messages, and social media. They exploit names of existing lottery companies/organizations to deceive users into believing that

F0x Ransomware
Ransomware

F0x Ransomware

F0xis a malicious program that is part of the Xorist ransomware family. Systems infected with this malware have their data encrypted and users receive ransom demands for decryption. During the encryption process, all affected files are appended with the ".f0x" extension. For example, a file origi

Uhofbgpgt Ransomware
Ransomware

Uhofbgpgt Ransomware

Belonging to the Snatch ransomware family, Uhofbgpgt encrypts files, modifies their filenames, and creates a ransom message. Uhofbgpgt renames encrypted files by appending the ".uhofbgpgt" extension to filenames. For example, "1.jpg" is renamed to "1.jpg.uhofbgpgt", "2.jpg" to "2.jpg.uhofbgpgt", a

DUSK 2 Ransomware
Ransomware

DUSK 2 Ransomware

Discovered by Lukáš Zobal, DUSK 2 is an updated variant of Dusk ransomware. This malware is designed to encrypt data and demand payment for decryption. During the encryption process, all affected files are appended with the ".DUSK" extension. For example, a file named something like "1.jpg" would

Security-update-required.com POP-UP Scam (Mac)
Mac Virus

Security-update-required.com POP-UP Scam (Mac)

security-update-required[.]com is a deceptive website running various scams. At the time of research, this web page promoted two different schemes. The scams promoted on this site primarily target iPhone users, yet it is often accessed via other Apple devices as well. One variant claims visitor

Wire Transfer Email Scam
Phishing/Scam

Wire Transfer Email Scam

There are many examples of phishing emails, which scammers send to deceive unsuspecting recipients into providing sensitive information. Commonly, scammers disguise their emails as official messages from legitimate companies. In this particular case, they attempt to trick recipients into opening a

Pay2Key Ransomware
Ransomware

Pay2Key Ransomware

Pay2Key is ransomware written in the C++ programming language that encrypts files with AES and RSA cryptography algorithms. Research shows that cyber criminals behind Pay2Key target companies located in Israel, however, it might also be used to attack other companies. So far, cyber criminals have

ERROR # 0xuaO-0x156m(3) POP-UP Scam
Phishing/Scam

ERROR # 0xuaO-0x156m(3) POP-UP Scam

"ERROR # 0xuaO-0x156m(3)" is a technical support scam. At the time of research, this scheme was promoted via the azurewebsites[.]net - Microsoft Azure website-hosting platform. In general, online scams are promoted on various deceptive web pages. The gist of tech support scams is claiming that us

IndexerInput Adware (Mac)
Mac Virus

IndexerInput Adware (Mac)

IndexerInput is an adware-type application with browser hijacker traits. Following successful infiltration, this app runs intrusive advertisement campaigns and makes modifications to browser settings to promote fake search engines. On Safari browsers, IndexerInput promotes 6v5f3l.com, and on Goo