Step-by-Step Malware Removal Instructions

Joker Trojan (Android)
Trojan

Joker Trojan (Android)

Joker (also known as SysJoker) is a malware Trojan that targets Android users. It was packaged in at least two dozen applications that were downloaded from Google Play store over 400,000 times. The main purpose of Joker is to generate revenue for the cyber criminals responsible through fraudulent

Luminosity RAT
Trojan

Luminosity RAT

Luminosity (also known as LuminosityLink) is a Remote Access Trojan (RAT), which was developed some years ago. At that time, cyber criminals could purchase Luminosity from its developers for $40, however, this RAT is no longer for sale. Note that many cyber criminals still use its 'cracked' versio

SpyMax Spyware (Android)
Trojan

SpyMax Spyware (Android)

SpyMax (also known as SpyNote and CypherRat) is malicious software classified as spyware. It targets devices using the Android OS (Operating System). This malware possesses various capabilities/features that enable its users (i.e., cyber criminals) to monitor the infected device. SpyMax can infect

Scarabey Ransomware
Ransomware

Scarabey Ransomware

Discovered by Jirehlov Solace, Scarabey prevents victims from accessing their files unless a ransom is paid. It encrypts files, changes their filenames and creates ransom messages. Scarabey renames encrypted files by changing the filenames to a string of random characters and appending the ".scarr

Sadogo Ransomware
Ransomware

Sadogo Ransomware

Discovered by dnwls0719, Sadogo encrypts files, changes filenames by appending the ".encrytped" extension (e.g., it renames "1.jpg" to "1.jpg.encrypted", and so on), and generates ransom messages within text files named "readme.txt". These ransom messages can be found in all folders that contain

AimSearch Adware (Mac)
Mac Virus

AimSearch Adware (Mac)

AimSearch is designed to function as adware and a browser hijacker. It serves advertisements and promotes the address of a fake search engine. Typically, people download and install apps of this type inadvertently. Research shows that this particular app is often installed via a fake Adobe Flash

Lezp Ransomware
Ransomware

Lezp Ransomware

Lezp belongs to a ransomware family called Djvu. Like most other programs of this type, Lezp encrypts files, modifies their filenames and creates a ransom message. It renames encrypted files by appending the ".lezp" extension. For example, it changes "1.jpg" to "1.jpg.lezp", "2.jpg" to "2.jpg.lez

Winners Of the New Iphone 11 Pro POP-UP Scam (Mac)
Mac Virus

Winners Of the New Iphone 11 Pro POP-UP Scam (Mac)

There are many websites claiming that a well-known company has chosen visitors to complete a survey and provide personal information to win a prize. This deceptive scam page claims that visitors have won the new iPhone 11 Pro. The main purpose of this scam is to trick unsuspecting visitors into

Maps & Directions by QuestForDirections Browser Hijacker
Browser Hijacker

Maps & Directions by QuestForDirections Browser Hijacker

Maps & Directions by QuestForDirections is a browser hijacker designed to promote srchbar.com (a fake search engine) by modifying browser settings. It is very likely that this app also operates as an information tracking tool. Few users download and install browser hijackers intentionally and

Easy Email Plus Browser Hijacker
Browser Hijacker

Easy Email Plus Browser Hijacker

Easy Email Plus is a browser hijacker which assigns certain browsers settings to easyemailplus.com (the address of a fake search engine). Easy Email Plus is distributed together with another potentially unwanted application (PUA) called Protect My Search App. These apps are categorized as PUAs, s