Virus and Spyware Removal Guides, uninstall instructions

Kiwm Ransomware

What kind of malware is Kiwm?

Kiwm is a type of malware that is part of the Djvu ransomware family. We came across Kiwm during our analysis of malware samples submitted to VirusTotal. It works by encrypting files, adding the ".kiwm" extension to their names, and leaving a ransom note (the "_readme.txt" text file).

An example how Kiwm alters the names of files: it changes "1.jpg" to "1.jpg.kiwm", and "2.png" to "2.png.kiwm", and so forth. Additionally, Kiwm might be distributed alongside information stealers such as Vidar and RedLine.

   
Kifr Ransomware

What kind of malware is Kifr?

Kifr belongs to the Djvu family of ransomware and follows the pattern of encrypting files and appending the ".kifr" extension to their names. The ransomware also creates a "_readme.txt" file with instructions on how to pay the ransom. Our researchers discovered Kifr while analyzing malware samples submitted to VirusTotal.

An example of how Kifr renames files: it changes "1.jpg" to "1.jpg.kifr", "2.png" to "2.png.kifr", and so forth. It is possible that Kifr ransomware is being distributed in conjunction with other malware, such as RedLine or Vidar, which are known to steal information.

   
SkipAds for Youtube Adware

What kind of application is SkipAds for Youtube?

During our investigation of SkipAds for Youtube, we discovered that it presents intrusive advertisements, which led us to classify this browser extension as adware. Ironically, its name suggests that it blocks ads. It is important to note that users often unintentionally download and install adware.

   
Proton Ransomware

What kind of malware is Proton?

Proton is ransomware that our team discovered on VirusTotal while checking the page for recently submitted malware samples. We found that Proton encrypts files, appends the kigatsu@tutanota.com email address, victim's ID, and, depending on the variant, ".Proton" or ".kigatsu" extension to filenames, and creates a ransom note ("README.txt").

An example of how Proton ransomware modifies filenames: it renames "1.jpg" to "1.jpg.[DoraRec@onionmail.org].Proton" or "1.jpg.[Kigatsu@tutanota.com][719149DF].kigatsu", "2.png" to "2.png.[DoraRec@onionmail.org].Proton" or "2.png.[Kigatsu@tutanota.com][719149DF].kigatsu" or , and so forth.

   
Rorschach Ransomware

What kind of malware is Rorschach?

Rorschach (also known as BabLock) is ransomware that encrypts files. The attackers aim at small and medium-sized businesses as well as industrial companies. Along with encrypting data, Rorschach also adds a random string of characters and a two-digit number (ranging from 00 to 98) to the end of filenames.

Also, it drops a ransom note ("_r_e_a_d_m_e.txt") and changes the desktop wallpaper. An example of how Rorschach modifies filenames: it changes "1.jpg" to "1.jpg.slpqne.37", "2.png" to "2.png.slpqne.39", and so forth. The appended string of random characters may vary depending on the ransomware variant.

   
Sports Engine Browser Hijacker

What kind of application is Sports Engine?

While examining the Sports Engine browser extension, we found that it hijacks a web browser by changing its settings. The purpose of this browser-hijacking app is to promote a fake search engine (sportengine.info). Additionally, Sports Engine can read certain data.

   
Security Breach - Stolen Data Email Scam

What is "Security Breach - Stolen Data"?

Upon scrutinizing this email, we have ascertained that it is a fraudulent extortion letter. This phishing campaign comprises of at least two versions of the letter, with the perpetrators employing the names of well-known cybercriminals to intimidate and lend credibility to their threats.

   
Messages Are Restrained Due To Low Bandwidth Email Scam

What is "Messages Are Restrained Due To Low Bandwidth"?

After reviewing this email, we determined that it is a phishing letter masquerading as a notification from an email service regarding mail delivery status. There are at least two variants of this letter in the phishing campaign. Scammers use both of them to lure unsuspecting recipients into providing personal information.

   
Self-Extracting Archive (SFX) Malware

What is a malicious self-extracting archive (SFX) file?

Self-extracting (SFX) archive files have traditionally been used to share compressed data with individuals who do not have the software to unpack and view the contents of a standard archive file. Nevertheless, these files can harbor covert malicious functionality that is not readily apparent to users and may evade detection by technology-based security measures.

   
Predator Spyware (Android)

What kind of malware is Predator?

Predator is the name of spyware (malicious software) targeting Android users. Between August and October 2021, the attackers utilized zero-day exploits that targeted Chrome and the Android OS to install Predator spyware implants on Android devices, even those that were fully up-to-date.

   

Page 335 of 2139

<< Start < Prev 331 332 333 334 335 336 337 338 339 340 Next > End >>
About PCrisk

PCrisk is a cyber security portal, informing Internet users about the latest digital threats. Our content is provided by security experts and professional malware researchers. Read more about us.

Malware activity

Global malware activity level today:

Medium threat activity

Increased attack rate of infections detected within the last 24 hours.

Virus and malware removal

This page provides information on how to avoid infections by malware or viruses and is useful if your system suffers from common spyware and malware attacks.

Learn about malware removal