Virus and Spyware Removal Guides, uninstall instructions

PROT Giveaway Scam

What is "PROT Giveaway"?

"PROT Giveaway" is a scam promising to quintuple the amount of Prostarter (PROT) cryptocurrency users contribute to it. Instead, the contributed amount will simply be lost, and victims will receive nothing in return.

   
Aimnip Ransomware

What kind of malware is Aimnip?

Aimnip is ransomware, a form of malware designed to encrypt files, generate a ransom note (the "Recover_UrFiles.txt" file), and rename all encrypted files. It appends a string of four random characters to filenames as their new extension. For example, Aimnip renames "1.jpg" to "1.jpg.mk4v", "2.jpg" to "1.jpg.1khm".

   
ProductArchive Adware (Mac)

What kind of application is ProductArchive?

ProductArchive is advertising-supported software that displays advertisements and hijacks a web browser (changes its settings to promote a fake search engine). Apps like ProductArchive usually are promoted/distributed using questionable methods. In such cases, users are likely to download or install them unintentionally.

   
PDFConverterWeb Browser Hijacker

What is PDFConverterWeb?

PDFConverterWeb is a piece of browser-hijacking software promoting the pdfconverterweb.com fraudulent search engine. Additionally, due to the questionable methods used to spread browser hijackers, they are also classified as PUAs (Potentially Unwanted Applications).

   
OriginType Browser Hijacker (Mac)

What is OriginType?

OriginType is a browser hijacker promoting the search.5k8zh0i.com fake search engine. Software products within this classification are also deemed to be PUAs (Potentially Unwanted Applications).

   
Accuj Ransomware

What kind of malware is Accuj?

Accuj is ransomware that blocks access to files (encrypts them) and creates the "b8Bo_HOW_TO_DECRYPT.txt" file to provide instructions on how to contact cybercriminals for file decryption. It also appends a string of random characters to filenames and the ".accuj" extension.

For example, a file named "1.jpg" gets renamed to "1.jpg.2YK02VvmkI44emiwCQgH74i9rIOQ5UD34rLqKkgeXbX_xNvMxCT2JLU0.accuj", "2.jpg" to "2.jpg.2YK02VvmkI44emiwCQgH74i9rIOQ5UD34rLqKkgeXbX_xNvMxCT2JLU0.accuj", and so on.

   
Purchase Contract Email Scam

What is Purchase Contract email scam?

It is a phishing email used to trick recipients into providing email login credentials on a fake Roundcube website. Roundcube is a web-based IMAP email client that has nothing to do with this phishing email. This email must be ignored.

   
The Raffle Of Prizes POP-UP Scam

What is "The raffle of prizes" scam?

"The raffle of prizes" is a scam promoted on various rogue sites. This scheme is presented as a prize raffle from Instagram. It must be emphasized that this giveaway is fake, and it is in no way associated with the Instagram social media platform.

Deceptive websites are typically accessed through mistyped URLs or redirects caused by untrustworthy webpages, intrusive adverts, or installed PUAs (Potentially Unwanted Applications).

   
Rook Ransomware

What kind of malware is Rook?

Rook is ransomware (an updated variant of Babuk) that prevents victims from accessing/opening files by encrypting them. It also modifies filenames and creates a text file/ransom note ("HowToRestoreYourFiles.txt"). Rook renames files by appending the ".Rook" extension. For example, it renames "1.jpg" to "1.jpg.Rook", "2.jpg" to "2.jpg.Rook".

   
Giuliano Ransomware

What is Giuliano ransomware?

Giuliano is a piece of malicious software classified as ransomware. This type of malware encrypts data (i.e., renders files inaccessible) and demands payment for the decryption.

This ransomware appends files with a ".Giuliano" extension. For example, a file initially titled "1.jpg" would appear as "1.jpg.Giuliano", "2.jpg" as "2.jpg.Giuliano", "3.jpg" as "3.jpg.Giuliano", etc. Afterwards, a ransom note - "README.txt" - is created.

   

Page 708 of 2125

<< Start < Prev 701 702 703 704 705 706 707 708 709 710 Next > End >>
About PCrisk

PCrisk is a cyber security portal, informing Internet users about the latest digital threats. Our content is provided by security experts and professional malware researchers. Read more about us.

Malware activity

Global malware activity level today:

Medium threat activity

Increased attack rate of infections detected within the last 24 hours.

Virus and malware removal

This page provides information on how to avoid infections by malware or viruses and is useful if your system suffers from common spyware and malware attacks.

Learn about malware removal