Virus and Spyware Removal Guides, uninstall instructions

LogarithmicBalance Adware (Mac)

What is LogarithmicBalance?

LogarithmicBalance is an adware-type application with browser hijacker characteristics. Following successful installation, this app runs intrusive advertisement campaigns and modifies browsers to promote fake search engines.

Additionally, most adware and browser hijackers monitor users' browsing activity. Due to the dubious methods used to proliferate LogarithmicBalance, it is also classified as a Potentially Unwanted Application (PUA).

   
Deathfiles Ransomware

What is Deathfiles ransomware?

Deathfiles is a type of malware that encrypts victims' files and appends the ".deathfiles" extension to the filenames of all encrypted files. For example, "1.jpg" is renamed to "1.jpg.deathfiles", "2.jpg" to "2.jpg.deathfiles", and so on.

Deathfiles provides contact information and various other details in a ransom message ("Recovery_Instructions.html" file), which can be found in all folders that contain encrypted files.

Note that Deathfiles belongs to the MedusaLocker ransomware family.

   
Tienes Una Multa Pendiente Email Virus

What is the "Tienes una multa pendiente" email?

"Tienes una multa pendiente" refers to a spam email campaign designed to proliferate the Mekotio Trojan. The term "spam campaign" is used to define a large-scale operation, during which thousands of deceptive/scam emails are sent. This Spanish-language spam campaign distributes messages claiming that recipients have a fine pending payment.

Note that none of the information provided by the "Tienes una multa pendiente" scam emails is true. When opened, the link present in these messages initiates the infection process of Mekotio malware.

   
GenerationUpdater Adware (Mac)

What is GenerationUpdater?

Adware is a type of software that displays ads. GenerationUpdater also changes browser settings (to promote a fake search) engine and might also collect browsing data (and other) information.

In summary, GenerationUpdater functions as adware and a browser hijacker. In most cases, users download and install apps such as GenerationUpdater unintentionally and, therefore, they are categorized as potentially unwanted applications (PUAs).

   
TikTok Followers Hack Scam

What is the "TikTok Followers Hack"?

"TikTok Followers Hack" refers to a scam run on various deceptive sites. This scheme offers the bogus service of generating followers, fans and 'likes' for users' content on TikTok, a video-sharing social networking platform owned by the ByteDance Ltd. company.

Note that the "TikTok Followers Hack" cannot operate as advertised and is in no way associated with ByteDance Ltd. It simply redirects users to other untrusted, deceptive, phishing and malicious websites.

Therefore, you are strongly advised against using the fake services offered by "TikTok Followers Hack", as it poses a threat to device and user safety. Typically, access to web pages that promote scams is gained via mistyped URLs, redirects caused by intrusive ads or by Potentially Unwanted Applications (PUAs) already installed on systems.

   
CNH Ransomware

What is CNH?

Discovered by 0x4143, CNH encrypts files and appends the ".cnh" extension to filenames. For example, "1.jpg" is renamed to "1.jpg.cnh", "2.jpg" to "2.jpg.cnh", and so on. It also creates the "README.txt" file, a ransom message with contact information.

   
NewPDFSearch Browser Hijacker

What is NewPDFSearch?

NewPDFSearch is dubious software categorized as a browser hijacker. It makes modifications to browser settings to promote newpdfsearch.com (a fake search engine).

Browser hijackers are usually able to track browsing-related data, and it is likely that NewPDFSearch operates in this manner as well. Due to the dubious tactics employed to proliferate browser hijackers, they are also classified as Potentially Unwanted Applications (PUAs).

   
PDFConverterSearcher Browser Hijacker

What is PDFConverterSearcher?

PDFConverterSearcher changes assigns specific browser settings to pdfconvertersearcher.com, the address of a fake search engine. Like most browser hijackers, PDFConverterSearcher changes these settings without users' permission. This app can also read browsing-related and possibly other information.

Typically, users install browser hijackers inadvertently and, for this reason, PDFConverterSearcher and other apps of his type are categorized as potentially unwanted applications (PUAs).

   
LyDark Ransomware

What is LyDark ransomware?

LyDark is malicious software, which is part of the Xorist ransomware family. It is designed to encrypt data and demand payment for decryption. During the encryption process, all affected files are appended with the ".LyDark" extension. For example, a file originally named something like "1.jpg" would appear as "1.jpg.LyDark", and so on.

After this process is complete, ransom messages are created in a pop-up window and "HOW TO DECRYPT FILES.txt" text files, which are dropped into compromised folders. Additionally, LyDark ransomware changes the desktop wallpaper.

   
PAYMENT Ransomware

What is PAYMENT?

PAYMENT belongs to the Phobos ransomware family. It is designed to encrypt files, rename each encrypted file, display a ransom message, and create the "info.txt" text file (second ransom message).

PAYMENT renames files by adding the victim's ID, the ICQ username of its developers, and appending the ".PAYMENT" extension. For example, "1.jpg" is renamed to "1.jpg.id[C279F237-3130].[ICQ_Cavallobtc].PAYMENT", "2.jpg" to "2.jpg.id[C279F237-3130].[ICQ_Cavallobtc].PAYMENT", and so on.

   

Page 935 of 2106

<< Start < Prev 931 932 933 934 935 936 937 938 939 940 Next > End >>
About PCrisk

PCrisk is a cyber security portal, informing Internet users about the latest digital threats. Our content is provided by security experts and professional malware researchers. Read more about us.

Malware activity

Global malware activity level today:

Medium threat activity

Increased attack rate of infections detected within the last 24 hours.

Virus and malware removal

This page provides information on how to avoid infections by malware or viruses and is useful if your system suffers from common spyware and malware attacks.

Learn about malware removal