Step-by-Step Malware Removal Instructions

COVID-19 Part Time Employment Email Virus
Phishing/Scam

COVID-19 Part Time Employment Email Virus

There are many cases whereby cyber criminals attempt to take advantage of the Coronavirus (COVID-19) crisis by sending fraudulent emails. In this case, they spread an email with a file attached, which supposedly contains a list of employees who violated quarantine orders. Scammers encourage recip

Bug Ransomware
Ransomware

Bug Ransomware

Bug ransomware was discovered by Jirehlov. Software of this type usually encrypts files, appends an extension to the filenames and creates and/or displays ransom messages. Bug renames encrypted files by adding the bugbugo@protonmail.com email address and appending the ".bug" extension to filenames

COVID 19 HELP DESK Email Virus
Phishing/Scam

COVID 19 HELP DESK Email Virus

"COVID 19 HELP DESK" is the subject of a scam email designed to proliferate the Agent Tesla Remote Access Trojan (RAT). This message attempts to exploit the Coronavirus/COVID-19 pandemic, claiming that the recipient has been chosen to receive a large sum of money from The World Health Organizatio

ProgressSite Adware (Mac)
Mac Virus

ProgressSite Adware (Mac)

ProgressSite is designed to serve advertisements, promote the Safe Finder web page via akamaihd.net, and collect sensitive information. Commonly, users download and install adware such as ProgressSite inadvertently. Therefore, these apps are categorized as potentially unwanted applications (PUAs

DHL Relief Email Virus
Phishing/Scam

DHL Relief Email Virus

A popular way to spread malware is by sending emails that contain malicious attachments and/or website links that download rogue files. In most cases, these emails are disguised as important, official messages from well-known companies. In this case, the scam is disguised as a message from DHL re

Eject Ransomware
Ransomware

Eject Ransomware

Eject belongs to the Phobos ransomware family. It encrypts files, changes their filenames, displays a pop-up window and creates a text file. Eject renames encrypted files by adding the victim's ID, cynthia-it@protonmail.com email address and appending the ".eject" extension to their filenames. Fo

DOP Ransomware
Ransomware

DOP Ransomware

Discovered by dnwls0719, DOP is a malicious program that is part of the Dharma ransomware family. This malware operates by encrypting data so that ransom demands can be made for decryption tools/software. When DOP ransomware encrypts, all affected file are renamed following this pattern: original

MegaUp.net Virus
Adware

MegaUp.net Virus

megaUp[.]net is a file hosting and sharing website, which allows users to upload, share, and manage their files. When a user uploads a file, megaUp[.]net creates a download package and link. In this way, it prepares a file for sharing with others, however, megaUp[.]net also includes additional com

ISR Stealer
Trojan

ISR Stealer

As its name suggests, ISR Stealer (also known as ISRStealer) steals sensitive information by logging keystrokes. There are many legitimate keyloggers online, however, even legitimate sites can be used for malicious intent. I.e., for stealing passwords and other confidential information. Research