Step-by-Step Malware Removal Instructions

CMG Ransomware
Ransomware

CMG Ransomware

CMG is a malicious program that is categorized as ransomware. Developers (cyber criminals) use it to blackmail people by encrypting data and making ransom demands. Once data is encrypted, it cannot be accessed or used. Note that CMG is a computer infection that belongs to the GlobeImposter ransom

L1LL Ransomware
Ransomware

L1LL Ransomware

L1LL is another ransomware-type virus discovered by Michael Gillespie. After successfully infiltrating the system, L1LL encrypts most stored data and appends filenames with the ".L1LL" extension (e.g., "sample.jpg" is renamed to "sample.jpg.L1LL"). Encrypted data immediately becomes unusable. Fol

Prus Ransomware
Ransomware

Prus Ransomware

First discovered by malware security researcher, Michael Gillespie, Prus is a ransomware-type virus that belongs to the Rotor malware family. After successful infiltration, Prus encrypts stored data using the AES-128 and RSA-2048 encryption algorithms. In addition, it appends each filename with th

Kittens New Tab Browser Hijacker
Browser Hijacker

Kittens New Tab Browser Hijacker

Developers claim that the Kittens new tab app allows users to search and access their bookmarks and applications using a customized homepage/search engine. Using this app, is possible to change the background image by choosing from over 30 HD pictures.  Kittens is presented as a useful applicatio

bRcrypT Ransomware
Ransomware

bRcrypT Ransomware

This high-risk computer infection was discovered by Michael Gillespie. bRcrypT is one of many ransomware-type programs used to encrypt data and make ransom demands. This particular ransomware creates a ransom message within a text file called "FILES ENCRYPTED.txt" (found in each folder containing

Ciantel.com Redirect
Browser Hijacker

Ciantel.com Redirect

Similar to initdex.com, defendsearch.com, and many others, ciantel.com is a fake search engine that, according to the developers, enhances the browsing experience by generating improved results and providing quick access to various popular websites. On initial inspection, ciantel.com may seem leg

Electronic Materials Involving Underage Children Email Scam
Phishing/Scam

Electronic Materials Involving Underage Children Email Scam

"Electronic materials involving underage children" is presented as an email from the Central Intelligence Agency (CIA) regarding an international paedophile case. The main purpose of this email is to trick recipients into believing that they are one of the suspects and that some of their personal

H-Worm RAT Virus
Trojan

H-Worm RAT Virus

H-WORM is a remote access tool (RAT) developed using VBScript. Research shows that this trojan was developed by a criminal who goes by the name of 'Houdini'. H-WORM is mainly distributed using spam email campaigns and has a USB distribution function implemented, however, at time of research, this

Azero Ransomware
Ransomware

Azero Ransomware

First discovered by malware security researcher, Jakub Kroustek, Azero is yet another ransomware infection that belongs to the Dharma malware family. As with other variants of Dharma, Azero encrypts stored files and appends filenames with the ".azero" extension plus the cyber criminal's email addr

ETH Ransomware
Ransomware

ETH Ransomware

First discovered by malware security researcher, Jakub Kroustek, ETH is a new variant of a high-risk ransomware infection called Dharma. After successful infiltration, ETH encrypts most stored files and appends filenames with the ".ETH" extension plus the developer's email address and victim's ID.