Virus and Spyware Removal Guides, uninstall instructions

Unnam3d Ransomware

What is Unnam3d?

Most ransomware-type programs are designed to encrypt files, prevent victims from accessing them, and keep them in that state until a ransom is paid. Unnam3d differs, since it places files into RAR archives that cannot be extracted without entering a password. It also changes the wallpaper and displays a ransom message in a pop-up window.

   
Tronas Ransomware

What is Tronas?

Discovered by Michael Gillespie, Tronas is a part of the Djvu ransomware family. Developers (cyber criminals) distribute the program to extort money from people. Tronas encrypts files stored on computers and prevents victims from accessing them until a ransom is paid.

This malicious program creates a "_open_.txt" text file and renames encrypted files by adding the ".tronas" extension. For example, "sample.jpg" becomes "sample.jpg.tronas".

   
Lythenheckwo.info POP-UP Redirect

What is lythenheckwo.info?

lythenheckwo.info is yet another rogue website that shares similarities with time2notification.com, push-checking.com, luckypushh.com, and dozens of others. It redirect users to malicious websites and delivers dubious content.

Users typically visit lythenheckwo.info inadvertently - they are redirected by potentially unwanted applications (PUAs) or intrusive advertisements displayed on other rogue sites. Most PUAs infiltrate computers without permission and, in addition to causing redirects, deploy advertisements and gather sensitive information.

   
Farfli Trojan

What kind of malware is Farfli?

Farfli is a Remote Access Trojan (RAT), a program that allows criminals to control an infected computer remotely. It is installed together with a 'keystroke logger', which records keys pressed on the keyboard.

Typically, people install this trojan-type program unintentionally, since they are tricked by cyber criminals. Note that having Farfli installed on your system can lead to serious problems.

   
Grovas Ransomware

What is Grovas?

Grovas belongs to the Djvu ransomware family and was discovered by Michael Gillespie. This is high-risk virus, a ransomware-type program that blocks access to data/files by encryption. Cyber criminals use these programs to blackmail victims: to receive a decryption tool, victims must pay a ransom.

Grovas adds the ".grovas" extension to all encrypted files (e.g., "1.jpg" becomes "1.jpg.grovas") and creates a text file called "_readme.txt", which can be found in all folders containing encrypted data.

   
Trosak Ransomware

What is Trosak?

Discovered by Michael Gillespie, Trosak is classified as a ransomware program from the Djvu ransomware family. It is designed to encrypt data (files stored on a computer) and prevent victims from accessing their files unless a ransom is paid.

Trosak adds the ".trosak" extension to every encrypted file. For example, "1.jpg" becomes "1.jpg.trosak". It also creates a ransom message in a text file called "_readme.txt".

   
Backdoor Virus Detected POP-UP Scam

What is "Backdoor Virus Detected"?

"Backdoor Virus Detected" is a fake virus alert displayed in a pop-up window, which appears when a deceptive, untrustworthy website is visited. This scam is used by cyber criminals to extort money from people by encouraging them to use paid software or services that supposedly resolve a problem and remove a virus.

Most people do not visit these scam websites intentionally - they are opened by potentially unwanted apps (PUAs) that users have installed on their computers or browsers. PUAs also deliver intrusive ads and gather various data.

   
Time2notification.com POP-UP Redirect

What is time2notification.com?

The internet is full of rogue websites similar to time2notification.com including, for example, luckypushh.com, appenzaeart.club, robotcaptcha.info, and many others. This website redirects visitors to various untrustworthy, deceptive websites or displays dubious content.

Most users arrive at this site unintentionally due to potentially unwanted apps (PUAs), which cause these redirects. Typically, users install PUAs inadvertently. Once installed, they deliver intrusive ads and track browsing-related information.

   
njRat Malware

What kind of malware is njRat?

The njRat program is categorized as a Remote Access Trojan (RAT). It usually installs without victims' knowledge, stealthily runs in the background (also without victims' knowledge), and collects various sensitive data. Cyber criminals use a number of methods to trick people into downloading and installing programs of this type.

   
Agent Tesla RAT

What is Agent Tesla?

Agent Tesla (AgentTesla) is a remote access tool (RAT) that allows users to control computers remotely. This tool can be purchased from its official website and developers present it as a legitimate program. In fact, cyber criminals use Agent Tesla to steal various personal data.

   

Page 1463 of 2145

<< Start < Prev 1461 1462 1463 1464 1465 1466 1467 1468 1469 1470 Next > End >>
About PCrisk

PCrisk is a cyber security portal, informing Internet users about the latest digital threats. Our content is provided by security experts and professional malware researchers. Read more about us.

Malware activity

Global malware activity level today:

Medium threat activity

Increased attack rate of infections detected within the last 24 hours.

Virus and malware removal

This page provides information on how to avoid infections by malware or viruses and is useful if your system suffers from common spyware and malware attacks.

Learn about malware removal