Step-by-Step Malware Removal Instructions

Originalsecureus.com POP-UP Scam (Mac)
Mac Virus

Originalsecureus.com POP-UP Scam (Mac)

originalsecureus[.]com is a deceptive website, running several scams. These schemes claim that the user's device is (or might be) infected - this is to promote untrusted or possibly malicious software. The endorsed applications are supposedly capable of removing the nonexistent threats. Note th

Bukyak Ransomware
Ransomware

Bukyak Ransomware

Bukyak is a part of the Aurora ransomware family. Like most programs of this type, it encrypts files, renames them and provides victims with instructions about how to contact the developers (plus other information). Bukyak renames files by appending the ".bukyak" extension to filenames. For examp

WANNACASH NCOV Ransomware
Ransomware

WANNACASH NCOV Ransomware

WANNACASH NCOV is a new variant of WannaCash ransomware discovered by Alex Svirid. WANNACASH NCOV encrypts files, changes their filenames, changes the desktop wallpaper, and creates a text file named "Как расшифровать файлы.txt". It renames encrypted files by using the "Файл зашифрован. Пиши. Поч

AresLookup Adware (Mac)
Mac Virus

AresLookup Adware (Mac)

AresLookup is an adware-type application that also possess browser hijacker characteristics. It delivers various intrusive advertisements, modifies browsers and promotes fake search engines. Due to its dubious proliferation methods, AresLookup is also categorized as a Potentially Unwanted Applic

Calix Ransomware
Ransomware

Calix Ransomware

Discovered by Huntress Labs, Calix is malicious software that belongs to the Phobos ransomware family. Calix is designed to encrypt victims' files and create the "info.txt" and "info.hta" files. The first is a ransom message within a text file, whilst the .hta file displays a message in a pop-up w

Rogue Ransomware
Ransomware

Rogue Ransomware

Based on Hidden Tear, Rogue ransomware was discovered by GrujaRS. This software encrypts files (rendering them inaccessible), renames them and creates and/or displays ransom messages. Rogue renames encrypted files by appending the ".rogue" extension to filenames. For example, it renames "1.jpg" t

Jest Ransomware
Ransomware

Jest Ransomware

Discovered by Petrovic, Jest is malicious software designed to encrypt data and demand payment for decryption. It is a new variant of FunFact ransomware. When Jest encrypts, all affected files are appended with the ".jest" extension. For example, a file like "1.jpg" would appear as "1.jpg.jest" fo

Mybestsecureus[.]com POP-UP Scam (Mac)
Mac Virus

Mybestsecureus[.]com POP-UP Scam (Mac)

mybestsecureus[.]com is the address of a dubious website, which advertises a potentially unwanted application (PUA) called VPN - Fast & Secure VPN Proxy. Typically, web pages such as mybestsecureus[.]com suggest that the visitors' devices may be at risk, infected with viruses, etc., and enc

Search.becovi.com Redirect (Mac)
Mac Virus

Search.becovi.com Redirect (Mac)

Search.becovi.com is the URL (address) of a search engine. Typically, when users experience redirects to various search engines - it is due to installed browser hijackers. This software does not require explicit user permission to infiltrate systems; therefore, users may be unaware of its presen

Makop Ransomware
Ransomware

Makop Ransomware

Makop is a type of malware categorized as ransomware. It operates by encrypting data of infected systems and demanding payment for decryption tools/software. During the encryption process, all affected files are renamed according to this pattern: original filename, unique ID, cyber criminals' emai