Step-by-Step Malware Removal Instructions

Hidden Bomb In The Building Email Scam
Phishing/Scam

Hidden Bomb In The Building Email Scam

"Hidden Bomb In The Building" is an email scam. There are many scams of this type, most of which are sextortion-type: they are used to trick people into believing that humiliating or compromising material (videos or photos) have been obtained and shared with all users on the recipient's contacts l

Chameleon Explorer Pro Adware
Adware

Chameleon Explorer Pro Adware

Chameleon Explorer Pro is presented as a high quality file/folder management tool. Judging on appearance alone, Chameleon Explorer Pro may seem legitimate and useful, however, this tool is categorized as a potentially unwanted application (PUA) and adware. Be aware that this PUA is likely to infi

IronHead Ransomware
Ransomware

IronHead Ransomware

Discovered by Michael Gillespie, IronHead is a computer infection that is likely to be a part of the Scarab ransomware family of viruses. Like most ransomware-type viruses, it is designed to prevent users from accessing their data by encryption. To recover their files, IronHead victims are encoura

UnlockAndRecover Ransomware
Ransomware

UnlockAndRecover Ransomware

Malware security researcher, Jack, was the first to discover UnlockAndRecover, a ransomware-type computer infection that cyber criminals use to blackmail victims. There are many viruses of this type that lock (encrypt) files and keep them in that state until the ransom is paid. Note, however, tha

Djvu Ransomware
Ransomware

Djvu Ransomware

Djvu is a high-risk virus that belongs to STOP malware family. It was firstly discovered by Michael Gillespie. It is categorized as ransomware and designed to lock (encrypt) files using a cryptography algorithm. Djvu renames each encrypted file by adding the ".djvu" or ".djvu*" extension (updated

A2 Trading Corp Email Virus
Phishing/Scam

A2 Trading Corp Email Virus

"A2 Trading Corp Email Virus" is a scam (spam email campaign) used by cyber criminals who attempt to trick recipients of the email to download and open an executable file. This then installs LokiBot, trojan-type malware that steals various personal/private data. We strongly recommend that you ign

XMRig Virus (Mac)
Mac Virus

XMRig Virus (Mac)

XMRig is a legitimate open-source application that allows utilization of system CPU resources to mine cryptocurrency. Cyber criminals often misuse these tools to generate revenue in malicious ways. Here, we look at malware that combines a backdoor-tool called EmPyre with XMRig and allows cyber c

Bing.com Redirect (Mac)
Mac Virus

Bing.com Redirect (Mac)

bing.com is a well-known, legitimate search engine owned by Microsoft and is not associated with any viruses, malware, and so on. Despite this, many browser hijackers, potentially unwanted applications (PUAs), promote bing.com to give the impression of legitimacy. Typically, users install apps

Severeweathercheck.com Redirect
Browser Hijacker

Severeweathercheck.com Redirect

severeweathercheck.com is one of many fake search engines available and is promoted using the Severe Weather Check application. According to the developers, this site can track weather changes in a specific area when users enter a city or ZIP code. This may seem to be a legitimate and useful app,

.SYS Ransomware
Ransomware

.SYS Ransomware

Discovered by Michael Gillespie, .SYS is another ransomware-type infection. As with most of these infections, it is designed to block access to files by encryption and keep them locked until ransom demands are met. Once the computer is infected and files are encrypted, .SYS replaces extensions wit