Step-by-Step Malware Removal Instructions

Emails Rejected On Admin Server Scam
Phishing/Scam

Emails Rejected On Admin Server Scam

It is common that scammers use email to trick recipients into giving them their personal information (for example, credit card details, passwords, emails and other login credentials, social security numbers), or transferring money. In order to give their emails legitimacy, they pretend to be legit

Gpay Ransomware
Ransomware

Gpay Ransomware

Ransomware is a type of malware that encrypts files and generates a ransom note (or multiple ransom notes). It blocks access to data unless a ransom is paid. Gpay encrypts and renames files, it appends the ".gpay" extension to their filenames (e.g., it renames a file named "1.jpg" to "1.jpg.gpay",

Air Sea Land Email Virus
Phishing/Scam

Air Sea Land Email Virus

"Air Sea Land email virus" refers to a malware-proliferating spam campaign. The term "spam campaign" describes a mass-scale operation during which deceptive/scam emails are sent by the thousand. The fake "Air Sea Land" letters supposedly concern order payments. This spam mail aims to spread malic

SkinnyBoy Malware
Trojan

SkinnyBoy Malware

It is known that SkinnyBoy was used in targeted attacks (in spear phishing campaigns targeting military and government institutions). At the current moment this malware is delivered using emails that contain malicious Microsoft Word document. SkinnyBoy is designed to collect information about the

New App(s) Have Access To Your Microsoft Account Email Scam
Phishing/Scam

New App(s) Have Access To Your Microsoft Account Email Scam

"New app(s) have access to your Microsoft Account email scam" refers to a spam campaign - a large-scale operation during which thousands of deceptive emails are sent. The letters distributed through this campaign - claim that new applications have connected to recipients' Microsoft accounts. The

Your Cloud Storage Was Compromised Email Scam
Phishing/Scam

Your Cloud Storage Was Compromised Email Scam

Typically, scammers behind sextortion scam emails claim to have compromising images or videos of the recipient and demand payment for not releasing those images or videos. In most cases, scammers claim to have used recipient's webcam to obtain compromising material. The main purpose of such scams

ZLO Ransomware
Ransomware

ZLO Ransomware

ZLO is the name of a screen-locking ransomware. It operates by locking operating systems with a full-screen ransom-demanding message. In other words, victims are unable to use their devices until they pay the ransom. However, at the time of research, the ZLO screenlocker's message could be remove

Pahd Ransomware
Ransomware

Pahd Ransomware

Ransomware attack victims cannot access encrypted files unless they decrypt those files with a tool that the attackers encourage to purchase from them. Usually, malware of this type encrypts and renames files, and generates a ransom note. Pahd modifies filenames by appending the ".pahd" extension

MapperState Adware (Mac)
Mac Virus

MapperState Adware (Mac)

MapperState is a rogue application categorized as adware. Additionally, this piece of software has browser hijacker traits. It operates by running intrusive advertisement campaigns and promoting fake search engines (through modifications to browser settings). MapperState likely has data trackin

Cryptoncrypt Ransomware
Ransomware

Cryptoncrypt Ransomware

Ransomware is a type of malware that encrypts files stored on a computer to prevent victims from accessing them and generates a ransom demanding message. Cryptoncrypt encrypts and renames files - it appends victim's ID, cryptoncrypt@tuta.io email address and the ".cnc" extension to their filenames