Step-by-Step Malware Removal Instructions

D0wnload3d.com POP-UP Scam (Mac)
Mac Virus

D0wnload3d.com POP-UP Scam (Mac)

Virtually identical to dataf0ral1.com, d0wnload3d[.]com is designed to promote a fake Adobe Flash Player installer. Once accessed, it automatically downloads the .dmg file ("Install.dmg"), which is a rogue installer associated with the aforementioned plug-in. These fake installation setups are

LeadingSignSearch Adware (Mac)
Mac Virus

LeadingSignSearch Adware (Mac)

Part of the AdLoad adware family, LeadingSignSearch is a rogue app that operates by delivering various intrusive advertisements. This application possesses some browser hijacker characteristics, such as making modifications to browser settings and promotion of fake search engines. Additionally,

Exq-timepieces.com Ads
Notification Spam

Exq-timepieces.com Ads

exq-timepieces[.]com is similar to many other rogue web pages designed to load dubious content or redirect visitors to other untrusted websites. For example, odicfulbrid[.]info, ryseconomi[.]info and goodbase[.]biz. Typically, people do not visit these sites intentionally. In most cases, they are

Congratulations Device User! POP-UP Scam
Phishing/Scam

Congratulations Device User! POP-UP Scam

"Congratulations device user!" is a scam run on various deceptive websites. It claims that users can win a prize (fake) supposedly provided by Google. This scam steals users' personal information and can also abuse their trust in other ways. Access to deceptive/scam sites is typically gained unin

Buerak Trojan
Trojan

Buerak Trojan

Buerak is the name of a malicious program, which is categorized as a Trojan. It opens 'backdoors' for other malicious software to infiltrate. In this way, Buerak causes chain infections and infects computers with other malware. It can be used to proliferate malicious programs, which then cause a n

Kraken Ransomware
Ransomware

Kraken Ransomware

Kraken is a malicious program belonging to the Ouroboros ransomware family. Systems infected with this malware suffer data encryption and users receive ransom demands for decryption tools/software. During the encryption process, all affected files are renamed according to the following pattern: or

Your Friend’s Account Was Compromised Email Virus
Phishing/Scam

Your Friend’s Account Was Compromised Email Virus

There are many examples of spam campaigns used by cyber criminals to infect computers with malicious programs. Typically, they send emails that contain dangerous attachments or website links hoping that recipients will open them. Their main goal is to trick people into executing a malicious file,

Thepiratebay.org Suspicious Website
Adware

Thepiratebay.org Suspicious Website

thepiratebay[.]org is an untrusted website for Peer-to-Peer sharing of various media and software. It allows users to download/share content via magnet links and torrent files. As well as infringing copyright laws, it also uses rogue advertising networks. Therefore, visitors to this site are ofte

NOtifications Manager Browser Hijacker
Browser Hijacker

NOtifications Manager Browser Hijacker

Users of NOtifications Manager are supposedly able to browse the web with fewer advertisements, however, this app is categorized as a potentially unwanted application (PUA), a browser hijacker. It promotes nonotifications.com (the address of a fake search engine) by changing browser settings. Mos

Quick 10 Second PC Scan POP-UP Scam
Phishing/Scam

Quick 10 Second PC Scan POP-UP Scam

"Quick 10 second PC scan" is a scam run on various deceptive websites. It shares many similarities with the "Norton Subscription Has Expired Today" scheme and operates by claiming that devices might be infected and advising users to perform a quick system scan. The bogus scan 'finds' various none