Virus and Spyware Removal Guides, uninstall instructions

Pulsar1 Ransomware

What is Pulsar1?

This malware was first discovered by Michael Gillespie and is a new variant of high-risk ransomware called Djvu. Following successful infiltration, Pulsar1 encrypts most stored data and appends filenames with the ".pulsar1" extension (e.g., "sample.jpg" is renamed to "sample.jpg.pulsar1").

In addition, Pulsar1 places a text file ("_readme.txt") in each folder containing encrypted files.

   
Jamper Ransomware

What is Jamper?

Jamper is a ransomware-type virus discovered by malware security researcher, Michael Gillespie. After successful infiltration, Jamper encrypts most stored data. Furthermore, this malware adds the ".jamper" appendix to each filename. I.e., "sample.jpg" is renamed to "sample.jpg.jamper".

Once encryption is complete, Jamper generates a text file ("---README---.TXT") and places a copy in every existing folder. Updated variants of this ransomware use ".jumper" and ".SONIC" extensions for encrypted files.

   
Iforgot.apple.com Email Scam

What is "iforgot.apple.com"?

The "Iforgot.apple.com" scam is used by cyber criminals to steal logins and passwords (AppleID accounts). They send this email to many people hoping that at least some will click the link and provide the requested details. We strongly recommend that you ignore this email, since it has nothing to do with the Apple company.

   
Charck Ransomware

What is Charck?

Charck is a malicious program that cyber criminals use to encrypt data and blackmail victims (by making ransom demands). Programs of this type are categorized as ransomware. Charck is a part of the Djvu suite of ransomware-type programs and was first discovered by Michael Gillespie.

When a computer is infected by this program, Charck adds the ".charck" extension to each encrypted file. For example, "1.jpg" becomes "1.jpg.charck". It also creates a ransom note in a text file called "_readme.txt", which can be found in each folder that contains encrypted data. Other variants of this ransomware use the ".charcl" extension for encrypted files.

   
Browsers.top POP-UP Redirect

What is browsers.top?

browsers.top is a rogue website that is very similar to many others of this type including pushtouchme.info, becausaldevel.info, and onlinepushnotification.com. When visited, this site displays dubious content or causes redirects to other dubious websites.

People generally arrive at browsers.top unintentionally due to potentially unwanted applications (PUAs) installed on their systems. These cause redirects to untrustworthy websites. Most PUAs deliver intrusive ads and record browsing related data.

   
Maersk Email Virus

What is "Maersk Email Virus"?

"Maersk Email Virus" is categorized as a spam campaign and a scam. Like most spam campaigns of this type, cyber criminals (scammers) use it to infect people's computers. To achieve this, they attach a malicious file (or include a website link leading to it) and hope that someone will open it.

In this case, "Maersk Email Virus" is used to distribute a malicious program called Pony. This spam (email) campaign is a typical scam that should not be trusted. More importantly, the included website link should not be opened.

   
Search.margamish.com Redirect (Mac)

What is search.margamish.com?

search.margamish.com is a fake search engine that is promoted as 'useful' and supposedly provides various features (enhanced browsing experience, faster searchers, more accurate search results, and so on). This may seem to be a legitimate search engine, however, it is promoted using a browser hijacker, a potentially unwanted application (PUA) called Margamish.

It is distributed using the installer of another program (PDF King app). This method is called "bundling". Do not trust apps promoted using this method. Once installed, Margamish changes browser settings and continuously gathers information relating to users' browsing activity.

   
Tefosteal Malware

What is Tefosteal?

Tefosteal, as its name suggests, is a malicious program that tracks and steals information. It targets data such as cookies and various other credentials from browsers, data from Discord chats, information about basic service set identifiers (BSSIDs), and other system information. It is also capable of taking screenshots.

Having a program of this type installed on your system might cause serious problems and should thus be uninstalled immediately.

   
Belonard Trojan

What kind of malware is Belonard?

Belonard is a trojan-type virus that targets Counter Strike 1.6 players. This malware infiltrates computers by exploiting remote code execution (RCE) vulnerabilities in the game client. After successful infiltration, Belonard modifies the game client to promote various servers, delivers ads, and so on.

   
CrimsonRAT Malware

What kind of malware is CrimsonRAT?

CrimsonRAT is remote access tool (RAT) developed using the Java programming language. Note that CrimsonRAT is categorized as malware and is not a legitimate application. Cyber criminals use this RAT to control infiltrated computers and perform various malicious tasks.

Criminals proliferate CrimsonRAT using spam email campaigns that contain malicious Microsoft Office documents. You can read more about this distribution method in this article.

   

Page 1451 of 2124

<< Start < Prev 1451 1452 1453 1454 1455 1456 1457 1458 1459 1460 Next > End >>
About PCrisk

PCrisk is a cyber security portal, informing Internet users about the latest digital threats. Our content is provided by security experts and professional malware researchers. Read more about us.

Malware activity

Global malware activity level today:

Medium threat activity

Increased attack rate of infections detected within the last 24 hours.

Virus and malware removal

This page provides information on how to avoid infections by malware or viruses and is useful if your system suffers from common spyware and malware attacks.

Learn about malware removal