Virus and Spyware Removal Guides, uninstall instructions

1978 Act Of Protection Of Children POP-UP Scam

What is "1978 Act Of Protection Of Children" pop-up scam?

It is a fake message displayed by a deceptive website designed to trick visitors into calling a fake technical support number. The website running this scam is disguised as a legitimate Microsoft site. Scammers behind it may try to extract personal information or money or use it for other malicious purposes. We discovered this scam site while inspecting other shady pages.

   
Hvzgbo Ransomware

What kind of malware is Hvzgbo?

Hvzgbo is ransomware belonging to the Snatch family. It encrypts files, appends the ".hvzgbo" extension to filenames of all encrypted files, and drops the "HOW TO RESTORE YOUR FILES.TXT" file (a ransom note). Our malware researchers discovered Hvzgbo ransomware while examining samples submitted to the VirusTotal site.

An example of how Hvzgbo modifies filenames: it renames "1.jpg" to "1.jpg.hvzgbo", "2.png" to "2.png.hvzgbo", and so forth.

   
Genuinescansupport.com Ads

What kind of page is genuinescansupport[.]com?

While analyzing genuinescansupport[.]com, we learned that it uses deceptive marketing (displays fake messages) to promote legitimate software. Also, genuinescansupport[.]com wants to show notifications. Shady pages should never be allowed to show notifications. We discovered genuinescansupport[.]com while inspecting sites that use rogue advertising networks.

   
FateGrab Stealer

What kind of malware is FateGrab?

FateGrab is the name of an information-stealing malware distributed along with another stealer called StealDeal. Threat actors deliver these malicious programs via email (they use a compromised email address for malware distribution) and messengers. Both FateGrab and StealDeal should be removed from compromised computers immediately.

   
HARDBIT 2.0 Ransomware

What kind of malware is HARDBIT 2.0?

HARDBIT 2.0 is a new version of the HARDBIT ransomware. We discovered this version while inspecting malware samples submitted to VirusTotal. HARDBIT 2.0 encrypts data, appends a string of random characters, the victim's ID, email address, and the ".hardbit2" extension to filenames.

Also, HARDBIT 2.0 changes the desktop wallpaper and creates two ransom notes ("Help_me_for_Decrypt.hta" and "How To Restore Your Files.txt"). An example of how HARDBIT 2.0 renames files: it changes "1.jpg" to "o7pvb003x0.[id-BFEBFBFF000A0655].[godgood55@tutanota.com].hardbit2", 2.png" to "b8uyt904pH.[id-BFEBFBFF000A0655].[godgood55@tutanota.com].hardbit2", and so forth.

   
Mudflised.com Ads

What kind of page is mudflised[.]com?

We have inspected mudflised[.]com and found that the purpose of this site is to lure visitors into allowing it to display/send notifications. Mudflised[.]com displays deceptive content to get that permission. Our team discovered mudflised[.]com while examining pages that use shay advertising networks.

   
StealDeal Stealer

What kind of malware is StealDeal?

StealDeal is the name of an information stealer targeting Internet browser data and possibly other information. It is known that StealDeal is delivered via a compromised email address. The file used for malware distribution injects StealDeal and another malware called FateGrab - an information stealer that targets various files.

   
ScreenConnect (ConnectWise) Client Scam

What is ScreenConnect (ConnectWise) Client scam?

Fraudsters use all kinds of ways to extract information or money from people and distribute malicious programs via emails. This article describes cases where fraudsters use emails to trick recipients into installing ConnectWise (formerly known as ScreenConnect). This software allows threat actors to perform malicious activities on computers. The method of using legitimate remote access tools (such as TeamViewer, UltraViewer and similar) to control victim's computers is rather common among scammers, as it is easy to trick people into installing legitimate and recognizable software.

   
RisePro Stealer

What kind of malware is RisePro?

RisePro is an information stealer that has similarities with another stealer called Vidar. It gathers sensitive data and extracts it in the form of logs. RisePro is written in the C++ programming language. Threat actors have been observed distributing RisePro via a malware downloader called PrivateLoader. The creators of RisePro are currently selling their malware via Telegram.

   
GodFather Malware (Android)

What kind of malware is GodFather?

GodFather is the name of an Android malware targeting online banking pages and cryptocurrency exchanges in 16 countries. It opens fake login windows over legitimate applications. Threat actors use GodFather to steal account credentials. Additionally, GodFather can steal SMSs, device information, and other data.

   

Page 404 of 2126

<< Start < Prev 401 402 403 404 405 406 407 408 409 410 Next > End >>
About PCrisk

PCrisk is a cyber security portal, informing Internet users about the latest digital threats. Our content is provided by security experts and professional malware researchers. Read more about us.

Malware activity

Global malware activity level today:

Medium threat activity

Increased attack rate of infections detected within the last 24 hours.

Virus and malware removal

This page provides information on how to avoid infections by malware or viruses and is useful if your system suffers from common spyware and malware attacks.

Learn about malware removal