Virus and Spyware Removal Guides, uninstall instructions

Load28.biz Ads

What is the load28[.]biz site?

load28[.]biz is a rogue website, which shares many similarities with goodmode.biz, pointcaptchaspot.com, zvideo-live.com, and thousands of others. This page operates by presenting visitors with dubious content and/or redirecting them to other bogus/malicious sites.

Visitors seldom access load28[.]biz or similar sites intentionally, they are usually redirected to them by intrusive advertisements or Potentially Unwanted Applications (PUAs) already installed on their devices. These apps do not require explicit user consent to infiltrate systems. PUAs cause redirects, deliver intrusive ad campaigns, and collect browsing-related data.

   
AlbDecryptor Ransomware

What is AlbDecryptor?

This ransomware was discovered by xiaopao.

AlbDecryptor is a type of malware that encrypts files (prevents victims from accessing or using them) and displays a ransom message in a pop-up window that contains payment and contact information, and various other details.

AlbDecryptor also renames files by appending the ".locked" extension to filenames. For example, "1.jpg" is renamed to "1.jpg.locked", "2.jpg" to "2.jpg.locked", and so on.

   
N26 Email Scam

What is the fake "N26" email?

"N26 Email Scam" is a the name of a spam campaign targeting Italian-speaking N26 bank clients. The term "spam campaign" defines a mass-scale operation during which thousands of deceptive emails are sent. N26 is a legitimate online bank headquartered in Berlin, Germany.

The "N26 Email Scam" messages are disguised as mail from the aforementioned bank. The scam emails make false claims that recipients' N26 banking accounts have been suspected. This campaign aims to promote a phishing website, which is presented as the sign-in page to N26 bank accounts.

Log-in credentials (i.e., emails and passwords) entered into this site will be exposed to the scammers behind the "N26 Email Scam".

   
Vassago Ransomware

What is Vassago ransomware?

Belonging to the Makop ransomware family, Vassago is data-encryption malware that makes ransom demands for decryption. Systems infected with this malicious software have their files rendered inaccessible and renamed, and victims receive payment demands for decryption tools to recover access and to regain use of their systems.

During the encryption process, affected files are renamed according to this pattern: original filename, unique ID, cyber criminals' email address, and the ".vassago" extension. For example, a file named "1.jpg" would appear as something similar to "1.jpg.[9B83AE23].[vassago_0203@tutanota.com].vassago" following encryption.

After this process is complete, ransom messages in "readme-warning.txt" files are dropped into compromised folders.

   
C.H. Robinson Email Virus

What is C.H. Robinson email virus?

One of the most popular ways to distribute malware is to send emails that contain malicious attachments or website links. Once opened, malicious attachments (or files downloaded via website links) install malicious software.

Typically, cyber criminals behind such emails claim to be from legitimate companies or organizations. Their emails are disguised as important, official, and encourage recipients to check the attachment (or website) immediately. This particular malspam campaign is used to distribute a banking Trojan called Dridex.

   
Driver Magic Unwanted Application

What is the Driver Magic unwanted application?

Driver Magic is untrusted software, endorsed as a tool capable of detecting outdated/missing drivers and installing/updating them, however, due to the dubious techniques used to proliferate Driver Magic, it is classified as a Potentially Unwanted Application (PUA).

As well as their legitimate appearance, apps within this classification are nonoperational and can have undisclosed, harmful functionality.

   
Goodmode.biz Ads

What is goodmode[.]biz?

goodmode[.]biz is an untrusted website designed to redirect visitors to other bogus/malicious pages and/or present them with dubious content. There are thousands of similar sites on the web including, for example, zvideo-live.com, fypretailo.top, and uploadhub.co.

Visitors to rogue web pages rarely access them intentionally - most are redirected by intrusive advertisements or by Potentially Unwanted Applications (PUAs) already installed on systems. These apps do not require explicit consent to infiltrate devices and, therefore, users may be unaware of their presence.

Despite their legitimate appearance, PUAs can have dangerous capabilities such as causing redirects, delivering intrusive advertisement campaigns, and collecting browsing-related information.

   
Yulnedxmo Ransomware

What is Yulnedxmo?

A ransomware attack is a type of malware attack in which the attacker (the ransomware) encrypts the victim's data and then demands payment to decrypt data.

Usually, files are encrypted and renamed. Yulnedxmo renames files by appending the ".yulnedxmo" extension to filenames. For example, "1.jpg" is renamed to "1.jpg.yulnedxmo", "2.jpg" to "2.jpg.yulnedxmo", and so on.

Ransomware often displays and/or creates ransom messages. Yulnedxmo creates the "HOW TO RESTORE YOUR FILES.TXT" file, which can be found in all folders that contain encrypted files.

Note that this ransomware belongs to the Snatch ransomware family.

   
Paras1te Ransomware

What is Paras1te?

Ransomware is a type of malware that prevents victims from accessing their computers or the files that are stored on them. This is an updated version of Parasite ransomware.

Paras1te blocks access to files by encryption. It also renames every encrypted file by appending the ".paras1te" to its filename. For example, "1.jpg" is renamed to "1.jpg.paras1te", "2.jpg" to "2.jpg.paras1te", and so on.

Paras1te instructs victims to follow the instructions in a pop-up window ("info.hta"), which it displays once the computer is infected.

   
Micro Ransomware

What kind of malware is Micro ransomware?

Micro is a malicious program, which is part of the CryptoWall ransomware family. Systems infected with this malware have their data encrypted and users receive ransom demands for decryption (the stored files are rendered inaccessible and renamed).

When this ransomware encrypts, affected files are appended with the ".micro" extension. For example, a file originally named something like "1.jpg" would appear as "1.jpg.micro", "2.jpg" as "2.jpg.micro", "3.jpg" as "3.jpg.micro", and so on.

Once this process is complete, identical ransom messages within "help_recover_instructions.txt", "help_recover_instructions.HTM", and "help_recover_instructions.png" files are dropped into compromised folders.

   

Page 950 of 2138

<< Start < Prev 941 942 943 944 945 946 947 948 949 950 Next > End >>
About PCrisk

PCrisk is a cyber security portal, informing Internet users about the latest digital threats. Our content is provided by security experts and professional malware researchers. Read more about us.

Malware activity

Global malware activity level today:

Medium threat activity

Increased attack rate of infections detected within the last 24 hours.

Virus and malware removal

This page provides information on how to avoid infections by malware or viruses and is useful if your system suffers from common spyware and malware attacks.

Learn about malware removal