Virus and Spyware Removal Guides, uninstall instructions

Redirect.viglink.com POP-UP Redirect

What is redirect.viglink.com?

redirect.viglink.com is a legitimate advertising network that claims to help developers generate traffic for their websites, however, cyber criminals also use this network to promote their (potentially malicious) sites. They often use potentially unwanted applications (PUAs) for this purpose.

In most cases, PUAs are installed without users' consent, deliver intrusive ads, gather data, and run background processes.

   
Onwardinated.com POP-UP Redirect

What is onwardinated.com?

There are countless rogue websites identical (or very similar) to onwardinated.com. Examples include notification-browser.com, crtmatix.com, and artnewsupdate.info.

 The website is designed to redirect to other untrustworthy and potentially malicious sites. Users do not generally visit onwardinated.com intentionally - they are redirected to it by potentially unwanted applications (PUAs) that infiltrate systems without consent, deploy advertisements, and collect user-system data.

   
AppleCare Protection Plan POP-UP Scam (Mac)

What kind of scam is "AppleCare Protection Plan?

"AppleCare Protection Plan" is a fake error message that shares similarities with "Mac iOS Security At Risk Error Code: HT201155", "AppleCare Tech Support", and many others. This error is displayed by various malicious websites.

Most visitors arrive at these sites inadvertently - they are redirected by unwanted applications or intrusive advertisements delivered by other rogue sites. Be aware that many unwanted applications infiltrate systems without users’ permission. As well as causing redirects, they deploy intrusive advertisements and gather sensitive information.

   
Unzippy Adware (Mac)

What is Unzippy?

Unzippy is another rogue app owned by the InstallCore adware family. It supposedly allows extraction and compression of data. Therefore, many users believe that Unzippy is legitimate and useful, however, it is categorized as a potentially unwanted application (PUA) and adware.

Unzippy often infiltrates systems without users’ permission, continually delivers intrusive advertisements, and gathers sensitive information.

   
TrojanDownloader:PDF/Domepidief.A Virus

What is TrojanDownloader:PDF/Domepidief.A?

TrojanDownloader:PDF/Domepidief.A is a high-risk trojan that originates from Emotet malware family and proliferated using spam email campaigns. Unlike previous Emotet variants, TrojanDownloader:PDF/Domepidief.A's distribution method is slightly different.

Rather than attaching a malicious Microsoft Office document, cyber criminals attach a deceptive PDF document that contains a download link to the document.

   
Invoice Attached - FINAL NOTICE Email Virus

What is Invoice Attached - FINAL NOTICE?

"Invoice Attached - FINAL NOTICE" is another spam email campaign used to distribute a high-risk trojan called TrickBot. It is very similar to "Payroll Timetable Email Virus", "Companies House Email Virus", and many others.

Cyber criminals often send thousands of deceptive emails encouraging users to open attached Microsoft Office documents, however, this results in infiltration of TrickBot.

   
Please Report This Activity POP-UP Scam

What is Please Report This Activity?

Similar to "Virus Is Sending Your Information To Hackers", "Your System Data Has Been Compromized", and many others, "Please Report This Activity" is a fake error message delivered by various deceptive websites.

Visitors generally arrive at these sites inadvertently - they are redirected by potentially unwanted applications (PUAs) or intrusive ads delivered by other rogue sites. Be aware that potentially unwanted applications usually infiltrate systems without users’ permission. As well as causing redirects, they deliver intrusive advertisements and gather sensitive information.

   
Monro Ransomware

What is Monro?

First discovered by malware security researcher, Jakub Kroustek, Monro is a high-risk ransomware-type virus that originates from Dharma malware family. After successfully infiltrating the system, Monro encrypts most stored data and appends filenames with the "id-[victim's_ID].[icrypt@cock.li].monro" extension.

For instance, "sample.jpg" might be renamed to a filename such as "sample.jpg.id-1E857D00.[icrypt@cock.li].monro". Once encryption is complete, Monro creates an HTML application ("Info.hta") and a text file ("FILES ENCRYPTED.txt"). The HTML application (essentially a pop-up window) is executed automatically.

   
Internet Booster Unwanted Application

What is Internet Booster?

Developers present Internet Booster as a legitimate application that optimizes Internet connections and increases download performance. Initially, Internet Booster may seem legitimate, however, developers proliferate this app using a deceptive marketing method called "bundling".

Therefore, in some cases, Internet Booster infiltrates systems without permission and is thus categorized as a potentially unwanted application (PUA).

   
Video AdBlocker adware

What is Video AdBlocker?

Video AdBlocker is a rogue application/browser extension identical to Facebook AdBlocker. This app offers functionality that supposedly blocks advertisements on the YouTube website. Judging on appearance alone, Video AdBlocker may seem to be a useful application, however, it is categorized as a potentially unwanted application (PUA) and adware.

The main reasons for these negative associations are: 1) stealth installation without users' consent; 2) display of intrusive advertisements, and; 3) potential tracking of browsing activity.

   

Page 1574 of 2150

<< Start < Prev 1571 1572 1573 1574 1575 1576 1577 1578 1579 1580 Next > End >>
About PCrisk

PCrisk is a cyber security portal, informing Internet users about the latest digital threats. Our content is provided by security experts and professional malware researchers. Read more about us.

Malware activity

Global malware activity level today:

Medium threat activity

Increased attack rate of infections detected within the last 24 hours.

Virus and malware removal

This page provides information on how to avoid infections by malware or viruses and is useful if your system suffers from common spyware and malware attacks.

Learn about malware removal