Step-by-Step Malware Removal Instructions

Ballacks Ransomware
Ransomware

Ballacks Ransomware

Our researchers discovered the Ballacks ransomware while inspecting new submissions to VirusTotal. This malicious program belongs to the VoidCrypt ransomware family. Once we launched a sample of Ballacks on our test machine, it began encrypting files ad modified their names. Original filenames we

Your Order Is Processed Email Scam
Phishing/Scam

Your Order Is Processed Email Scam

After analyzing two "Your Order Is Processed" emails, we determined that they are spam. These letters make similar claims about the recipient having purchased an expensive item from a well-known retailer. The goal is to trick the recipient into calling the provided telephone number to cancel the p

Smartopc.xyz Ads
Notification Spam

Smartopc.xyz Ads

While investigating suspicious sites, our research team found the smartopc[.]xyz rogue webpage. It operates by promoting browser notification spam and redirecting users to other (likely untrustworthy/malicious) websites. Users typically access smartopc[.]xyz and similar pages via redirects caused

MLF Ransomware
Ransomware

MLF Ransomware

Our research team discovered the MLF ransomware-type program while inspecting new submissions to VirusTotal. Additionally, MLF belongs to the Phobos ransomware family. Once a sample of this ransomware was executed on our test machine, it encrypted files and altered their filenames. The titles of

TigerRAT Malware
Trojan

TigerRAT Malware

TigerRAT is a Remote Access Trojan (RAT). This malware operates by allowing attackers to remotely access and control infected machines. RATs are notoriously multifunctional programs, which can be variously used and cause a broad range of serious threats. There is proof that TigerRAT was developed

MagicRAT Malware
Trojan

MagicRAT Malware

MagicRAT is a malicious program classified as a RAT (Remote Access Trojan). This trojan is written C++ programming language and uses the Qt Framework; the latter is an uncommon choice in malware development. RATs are designed to enable remote access/control over infected devices. There is strong

TabX Browser Hijacker
Browser Hijacker

TabX Browser Hijacker

Our research team discovered a website promoting the TabX browser extension while inspecting dubious pages. After analyzing this piece of software, we determined that it operates as a browser hijacker promoting the newtaber.com fake search engine. TabX assigns newtaber.com as browsers' hom

Coinlocker Ransomware
Ransomware

Coinlocker Ransomware

While investigating new submissions to VirusTotal, we discovered the Coinlocker ransomware-type program. Malware within this classification encrypts data and demands payment for decryption. After we executed a sample of Coinlocker on our test machine, it encrypted files and appended their filenam

Tail doing Browser Hijacker
Browser Hijacker

Tail doing Browser Hijacker

Our researchers discovered the "Tail doing" browser extension while investigating suspicious software endorsing websites. After analyzing this extension, we determined that it is a browser hijacker. Tail doing modifies browsers to promote the tailsearch.com fake search engine. Additionally, this b

You Have 3 Encrypted Documents Email Scam
Phishing/Scam

You Have 3 Encrypted Documents Email Scam

After inspecting the "You Have 3 Encrypted Documents" email, we determined that it is spam. Letters of this spam campaign operate as phishing scams. By claiming that recipients have been sent secured files, the mail attempts to trick users into disclosing their email account log-in credentials.