Step-by-Step Malware Removal Instructions

LOCK Ransomware
Ransomware

LOCK Ransomware

LOCK belongs to the Xorist ransomware family. Like most programs of this type, it prevents victims from accessing their files by encryption. LOCK also renames every encrypted file by appending the ".LOCK" extension to its filename. For example, it renames "1.jpg" to "1.jpg.LOCK", "2.jpg" to "2.jpg

Anubis Trojan (Android)
Trojan

Anubis Trojan (Android)

Targeting Android users, Anubis is malicious software classified as a banking Trojan. This malware attempts to steal banking information and can lead to victims' experiencing financial loss, privacy issues and other serious problems. Anubis has been observed being proliferated via deceptive/scam

Nitol Malware
Trojan

Nitol Malware

Nitol is malicious software. This is malware that has many dangerous capabilities, primarily deployment of DDoS (distributed denial-of-service) attacks and granting cyber criminals who use it remote access and control over the infected device. These functionalities can be used in malicious ways an

COVID-19 Stimulus Email Virus
Phishing/Scam

COVID-19 Stimulus Email Virus

The number of cyber criminals (scammers) who seek to take advantage of the coronavirus disease (COVID-19) pandemic is growing daily. Commonly, they try to achieve this by sending fraudulent emails to trick recipients into clicking malicious links or opening attachments. In this particular case, t

Apple-online-guard.com POP-UP Scam (Mac)
Mac Virus

Apple-online-guard.com POP-UP Scam (Mac)

apple-online-guard[.]com is a scam website designed to target iPhone users, however, it might also be accessed by other Apple products. This deceptive site claims that visitors' devices are infected and recommends download/installation of a promoted application. No web page can detect threats/i

Gula Ransomware
Ransomware

Gula Ransomware

Like most ransomware-type programs, Gula is designed to deny access to data by encryption, rename all encrypted files, and provide victims with instructions about how to contact the developers (and other details) within a ransom message. It renames all files by appending the ".Gula" extension to f

The Government Forms Promos Adware
Adware

The Government Forms Promos Adware

The Government Forms Promos is classified as adware. It is promoted as a tool capable of providing access to tax, immigration, DMV and many other forms. Instead of delivering these features, The Government Forms Promos runs intrusive advertisement campaigns, which deliver a variety of undesirable,

Search Power+ Browser Hijacker
Browser Hijacker

Search Power+ Browser Hijacker

Search Power+ is a potentially unwanted application (PUA), a browser hijacker. This rogue app hijacks browsers by assigning certain settings to searchpowerapp.com, the address of a fake search engine. PUAs often collect user-system information as well. Browser hijackers are categorized as PUAs, si

Eventbot Banking Trojan (Android)
Trojan

Eventbot Banking Trojan (Android)

Eventbot is a banking Trojan which targets Android users. It attempts to steal sensitive information (such as credit card details, credentials) using overlay technique. It also abuses the Accessibility Service. Eventbot can be the reason behind serious privacy issues, monetary loss and other probl

Pekraut RAT
Trojan

Pekraut RAT

Pekraut is malicious software classified as a Remote Access Trojan (RAT). This malware allows remote access and control over the infected device. RATs have a variety of capabilities and features, which enable a broad range of misuse. Pekraut Trojan has 27 commands, though at the time of research,