Virus and Spyware Removal Guides, uninstall instructions POP-UP Scam (Mac)

How to remove apps that promote pages like peachtrackereu[.]com?

What is peachtrackereu[.]com?

The main purpose of the peachtrackereu[.]com website is to promote a potentially unwanted application (PUA), a VPN client that supposed to protect their devices. There are two main reasons not to trust such pages: users do not visit them intentionally and, once visited, most of them display fake virus alerts or other deceptive notifications with a purpose to trick visitors into installing some application.

God Ransomware

God ransomware removal instructions

What is God ransomware?

God is the name of a malicious program, which is part of the VoidCrypt ransomware family. Systems infected with this malware have their data encrypted and receive ransom demands for the decryption. During the encryption process, files are retitled following this pattern: original filename, cyber criminals' email address, unique ID assigned to the victims and the ".God" extension. For example, a file like "1.jpg" would appear as something similar to "1.jpg.[][369DLVSPNK1BE07].God" - after encryption. Once this process is complete, ransom notes - "!INFO.HTA" - are dropped into compromised folders.

Blackheel Ransomware

Blackheel ransomware removal instructions

What is Blackheel?

Blackheel encrypts files (and modifies their filenames), changes desktop wallpaper and creates the "READ_ME.txt" file (ransom note). It renames files by appending ".a" as the extension, for example, it renames a file named "1.jpg" to "1.jpg.a", "2.jpg" to "2.jpg.a", and so on. Blackheel ransomware is based on Hidden Tear (open-source ransomware), it was discovered by Ravi.

Emails Sync Failure Email Scam

"Emails Sync Failure" email scam removal guide

What is the "Emails Sync Failure" scam letter?

"Emails Sync Failure" is the name of an email spam campaign. The term "spam campaign" refers to a mass-scale operation, during which deceptive emails are sent by the thousand. The letters sent through this campaign are disguised as notifications, concerning undelivered emails. The purpose of this scam is to trick the recipients into disclosing their email account passwords via phishing website, thereby allowing scammers access to the account.

Epsilon Ransomware

Epsilon ransomware removal instructions

What is the Epsilon ransomware?

Discovered by GrujaRS, Epsilon is the name of a ransomware-type program. This malware is designed to encrypt the data of infected systems - in order to demand payment for the decryption. As Epsilon encrypts, all of the affected files are renamed following this pattern: original filename, cyber criminals' email address and the ".boom" extension. For example, a file like "1.jpg" would appear as something akin to "1.jpg.[].boom" - after encryption. Once this process is complete, a ransom note - "READ_ME.hta" is created.

ActiveToken Adware (Mac)

How to remove ActiveToken from Mac?

What is ActiveToken?

ActiveToken is the name of the application that functions both as adware (generates advertisements) and a browser hijacker (changes browser settings without user's permission). It is likely that ActiveToken gathers certain information as well. It is worthwhile to mention that in most cases users download and install adware, browser hijackers unknowingly, for this reason ActiveToken is categorized as potentially unwanted application (PUA).

ConsoleProgram Adware (Mac)

How to remove ConsoleProgram adware from Mac?

What is ConsoleProgram?

ConsoleProgram is an untrustworthy app, which is classified as adware. Aside from running intrusive advertisement campaigns (i.e. delivering various ads), this application also operates like a browser hijacker. In other words, ConsoleProgram modifies browser settings in order to promote fake search engines. Due to the dubious techniques employed in this app's distribution, it is considered to be a PUA (Potentially Unwanted Application) as well. Most PUAs collect browsing-related information; it is highly likely that ConsoleProgram also has such data tracking abilities. ConsoleProgram has been observed being promoted by an installer of another PUA - called DLVPlayer.

Win The New iPhone 12 POP-UP Scam

Win The New iPhone 12 scam removal instructions

What is Win The New iPhone 12 scam?

The main purpose of this scam is to trick people into providing contact and other information that supposedly will be used to contact winners of the iPhone 12. Nobody ever wins anything through websites like this one, on the contrary, people who fall for such scams lose money, become victims of identity theft, lose access to personal accounts and/or encounter other issues.

Dis Ransomware

Dis ransomware removal instructions

What is Dis ransomware?

Dis is designed to encrypt files, modify the filenames of all encrypted files, display pop-up window and create the "FILES ENCRYPTED.txt" file. It renames encrypted files by adding victim's ID, email address and appending the ".dis" extension to their filenames. For example, it renames "1.jpg" to "[].dis", "2.jpg" to "[].dis", and so on. The pop-up window that Dis displays (and the text file that it creates) are ransom notes that contain instructions on how to contact its developers. Dis belongs to the ransomware family called Dharma.

ExtendedMode Adware (Mac)

How to remove ExtendedMode adware from Mac?

What is ExtendedMode adware?

ExtendedMode is an adware-type application, which possesses certain traits of browser hijackers. Following successful infiltration, this app delivers intrusive advertisement campaigns and makes modifications to browser settings - in order to promote fake search engines. Additionally, most adware-types and browser hijackers spy on users' browsing activity and gather sensitive information extracted from it. Due to the dubious methods used to proliferate ExtendedMode, it is also categorized as a PUA (Potentially Unwanted Application).


Page 7 of 1180

<< Start < Prev 1 2 3 4 5 6 7 8 9 10 Next > End >>
Malware activity

Global malware activity level today:

Medium threat activity

Increased attack rate of infections detected within the last 24 hours.

Virus and malware removal

This page provides information on how to avoid infections by malware or viruses and is useful if your system suffers from common spyware and malware attacks.

Learn about malware removal