Virus and Spyware Removal Guides, uninstall instructions Ads

What is rumiceseeds[.]com?

Similar to - rumiceseeds[.]com is a rogue website, functioning as a redirect to other compromised and/or malicious sites, as well as a place rife with questionable/hazardous content for user consumption.

Most visitors of this website happen upon it unwillingly, by being redirected to it by other untrustworthy sites (specifically, via intrusive advertisements found within them) or by PUAs (potentially unwanted applications) opening rumiceseeds[.]com autonomously. It should be known that said applications do not require express user approval to invade their system.

Coupons Flash Browser Hijacker

What is Coupons Flash?

Coupons Flash is a rogue application that claims to save time and money by providing shopping coupons and information about special deals/offers on various online stores. Judging on appearance alone, Coupons Flash may seem legitimate and useful, however, it is categorized as a potentially unwanted application (PUA) and a browser hijacker.

There are three main reasons for these negative associations: 1) stealth installation without users' consent; 2) promotion of fake search engine, and; 3) tracking of browsing activity.

Grethen Ransomware

What is Grethen?

Grethen is ransomware-type software and possibly a mix of other programs of this type such as Scarab and Dharma. Grethen locks (encrypts) victims' files and denies access to them unless a ransom is paid.

It stores the "READ ME.TXT" file (a ransom message) in all folders that contain encrypted data and opens an HTML application ("READ ME.hta"), which displays a pop-up window.

Grethen renames encrypted files by changing extensions to ".[]" and assigning filenames to a random string. For example, it might rename "1.jpg" to a filename such as "Al4=BLF3eb8CWv6pNF WINtbicg25DuIxdz8nsT19 spStjXrKhiT1Y34S.[]".

Nacro Ransomware

What is Nacro?

Belonging to the Djvu ransomware family, Nacro is a high-risk infection designed to encrypt stored data and make ransom demands.

As with most infections from this ransomware family, Nacro was first discovered by Michael Gillespie. During encryption, Nacro renames each compromised file by adding the ".nacro" appendix (e.g., "sample.jpg" becomes "sample.jpg.nacro"). Additionally, Nacro generates a text file ("_readme.txt") and stores copies in most existing folders.

Track Your Transit Info Browser Hijacker

What is Track Your Transit Info?

Track Your Transit Info is the name of an application that supposedly gives free access to public transit routes. It is presented as a useful app, however, Track Your Transit Info is a browser hijacker that changes browser settings (promotes a fake search engine) and might also gather data relating to its users.

Additionally, the developers of Track Your Transit Info distribute it with another similar app called Hide My Searches. Typically, people download and install apps of this type unintentionally. They are also known as potentially unwanted applications (PUAs).

Ramnit Trojan

What is Ramnit?

Ramnit is a family of malware-distribution trojans. Depending on particular variants, anti-virus suites can detect Ramnit as "Win32/Ramnit.A" or "Win32/Ramnit.B". These viruses infiltrate systems without users' consent and open "backdoors" for other malware to infiltrate the system. Therefore, its presence typically leads to further computer infections.

Simple Package Tracker Browser Hijacker

What is Simple Package Tracker?

As its name suggests, the Simple Package Tracker application supposedly allows users to track their packages, which are delivered by carriers such as FedEx, USPS, UPS, DHL and Canada Post. In fact, Simple Package Tracker is a browser hijacker, an application that changes browser settings (to promote a fake search engine) and gathers various data.

Since most people download and install apps of this type inadvertently, they are categorized as potentially unwanted applications (PUAs). Furthermore, developers distribute Simple Package Tracker with another PUA named Hide My Searches. Therefore, people who installed Simple Package Tracker on their systems, probably also installed Hide My Searches.

Poison Ivy RAT

What kind of malware is Poison Ivy?

Poison Ivy is software that can access and control connected computers remotely. Programs of this type are called remote access or administration tools (RATs), however, not all are legitimate and some people use them illegally. For example, many cyber criminals use RATs to steal personal information, distribute malware, and use them for other malicious purposes. Ads

What is dredrewlaha[.]info?

dredrewlaha[.]info is a rogue website designed to redirect users to other untrustworthy and malicious sites, as well as feed them with dubious content. The website shares many similarities with and many other rogue sites.

User do not generally access dredrewlaha[.]info intentionally - they are redirected to it by other compromised sites through intrusive ads or PUAs (potentially unwanted applications). PUAs often infiltrate users' devices without permission, cause redirects, deliver intrusive advertisements, and monitor and gather information relating to users' browsing activity.

NetWire RAT

What kind of malware is NetWire?

NetWire (also known as Recam or NetWiredRC) is a malicious application and a remote access tool (RAT). Typically, people use RATs to access and control computers remotely. For example, these tools can be used legitimately by system administrators for accessing client computers, however, RATs can also be employed for malicious purposes.

Cyber criminals use them to steal sensitive data and information, proliferate (download/install) malware, and so on. Remote access tools that were not installed on intentionally should be removed immediately, otherwise they might lead to serious problems.


Page 1415 of 2174

<< Start < Prev 1411 1412 1413 1414 1415 1416 1417 1418 1419 1420 Next > End >>
About PCrisk

PCrisk is a cyber security portal, informing Internet users about the latest digital threats. Our content is provided by security experts and professional malware researchers. Read more about us.

Malware activity

Global malware activity level today:

Medium threat activity

Increased attack rate of infections detected within the last 24 hours.

Virus and malware removal

This page provides information on how to avoid infections by malware or viruses and is useful if your system suffers from common spyware and malware attacks.

Learn about malware removal