Virus and Spyware Removal Guides, uninstall instructions

Payfast Ransomware

What is Payfast ransomware?

Payfast is a new variant of the ZEPPELIN ransomware. This malicious program operates by encrypting data to make ransom demands - for the decryption. In other words, victims cannot use the file affected by Payfast, and they are asked to pay - to restore access/use of their data.

During the encryption process, files are appended with an extension consisting of ".payfast" and the ID assigned to the victim (i.e., ".payfast[victim's_ID]"). For example, a file like "1.jpg" would appear as something similar to "1.jpg.payfast500.313-558-668" - following encryption.

Once this process is complete, a ransom note in a text file titled - "!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT" - is dropped onto the desktop.

   
Movie Right Browser Hijacker

What is Movie Right browser hijacker?

Movie Right is a browser hijacker because it changes the browser's settings to search.movieapp.net and does not allow to undo its changes. Search.movieapp.net is the address of a fake search engine. In most cases, users install apps like Movie Right unknowingly. Thus, they are called potentially unwanted applications (PUAs).

   
MALWARE DETECTED Action Required POP-UP Scam (Mac)

What is "MALWARE DETECTED Action Required"?

"MALWARE DETECTED Action Required" is a scam promoted on deceptive websites (e.g., topdefence-formob[.]com). There are two practically identical variants of this scam, with the primary difference being the graphical design. These schemes target iPhone users, yet they might be displayed on other Apple devices. Both scam versions claim that users' devices have been infected with trojan-type malware and urge immediate removal.

Typically, such deceptive content promotes untrustworthy software products. They may endorse legitimate app; however, the schemes most commonly distribute fake anti-viruses, adware, browser hijackers, and other PUAs (Potentially Unwanted Applications). It is noteworthy that schemes of this kind have been observed proliferating malware (e.g., trojans, ransomware, cryptominers, etc.).

Users seldom enter scam sites intentionally. Most access these websites via mistyped URLs, or redirects caused by rogue pages, intrusive advertisements, or PUAs already installed onto their devices.

   
Profi-para.com Ads

What is profi-para[.]com?

Profi-para[.]com is similar to codingcaptcha[.]com, createdtoprotect[.]com, dcareyouto[.]top and many other websites designed to promote other shady websites and to trick visitors into agreeing to get notifications by displaying deceptive content. It is not common for websites of this type to be visited by users intentionally.

   
GetGameSearch Browser Hijacker

What is GetGameSearch browser hijacker?

GetGameSearch is a browser hijacker designed to promote the getgamesearch.com address, a fake search engine. GetGameSearch promotes getgamesearch.com by modifying the browser's settings. Most users download and install browser hijackers accidentally. For this reason, they are called potentially unwanted applications (PUAs).

   
Codingcaptcha.com Ads

What is codingcaptcha[.]com?

Codingcaptcha[.]com is a rogue site, which operates by presenting visitors with questionable content and/or redirecting to other webpages (likely unreliable or malicious). There are thousands of such websites on the Web; createdtoprotect.comdcareyouto.top, and okaynotification.com are but a few examples.

Users typically enter rogue pages unintentionally. Most get redirected to them by untrustworthy sites, intrusive ads, or installed PUAs (Potentially Unwanted Applications). This software can infiltrate systems without explicit permission. PUAs are designed to cause redirects, run intrusive advertisement campaigns, and collect browsing data.

   
Hackers Hijacked Your Calendar, Infected Your Battery POP-UP Scam (Mac)

What kind of scam is "Hackers hijacked your calendar, infected your battery"?

It is a deceptive message displayed by an untrustworhty page. Users do not visit scam websites like this one intentionally. Most of these pages display fake notifications suggesting that a device is infected with viruses. They are created to trick visitors into installing rogue applications and visiting other untrustworthy websites.

   
WIN Ransomware

What kind of malware is WIN ransomware?

Belonging to the Phobos ransomware family, WIN is a malicious program designed to encrypt data and demand payment for the decryption. In other words, victims cannot access the files affected by this malware, and they are asked to pay - to restore access to their data.

During the encryption process, files are renamed according to this pattern: original filename, unique ID assigned to the victim, cyber criminals' email address, and ".WIN" extension. For example, a file initially titled "1.jpg" would appear as something similar to "1.jpg.id[C279F237-2989].[starcomp@keemail.me].WIN".

Once the encryption process is complete, ransom notes are created/displayed in a pop-up window ("info.hta") and "info.txt", these files are dropped onto the desktop.

   
Order Loading Information Email Virus

What is Order Loading Information email virus?

When cybercriminals use email as a channel to distribute malicious software, they send emails containing malicious attachments or website links. They pretend to be legitimate institutions, companies, or other entities and disguise their emails as official, important letters. This particular email is used to deliver FormBook.

   
Venomous Ransomware

What is Venomous ransomware?

Venomous encrypts files and creates a text file named "SORRY-FOR-FILES.txt" as its ransom note. Also, this ransomware renames files by appending the victim's ID and ".venomous" extension to their filenames. For example, it renames a file named "1.jpg" to "1.jpg.FB5MMSJUD2WP.venomous", "2.jpg" to "2.jpg.FB5MMSJUD2WP.venomous", and so on.

   

Page 1020 of 2343

<< Start < Prev 1011 1012 1013 1014 1015 1016 1017 1018 1019 1020 Next > End >>
About PCrisk

PCrisk is a cyber security portal, informing Internet users about the latest digital threats. Our content is provided by security experts and professional malware researchers. Read more about us.

Malware activity

Global malware activity level today:

Medium threat activity

Increased attack rate of infections detected within the last 24 hours.

Virus and malware removal

This page provides information on how to avoid infections by malware or viruses and is useful if your system suffers from common spyware and malware attacks.

Learn about malware removal