Virus and Spyware Removal Guides, uninstall instructions

StandardMethod Adware (Mac)

What is StandardMethod?

StandardMethod is a rogue application categorized as adware. This app also has browser hijacker characteristics. It operates by running intrusive advertisement campaigns and making modifications to browser settings to promote fake search engines.

Additionally, adware and browser hijackers have data tracking capabilities, which are employed to collect browsing-related information. Due to the dubious techniques used to proliferate StandardMethod, it is classified as a Potentially Unwanted Application (PUA).

   
Sext Ransomware

What is Sext ransomware?

Sext was discovered by Marcelo Rivero and is identical to other ransomware-type programs called Connect and Bondy. Sext encrypts and renames files, and creates the "HELP_DECRYPT_YOUR_FILES.txt" text file/ransom message in all folders that contain encrypted files. For example, "1.jpg" is renamed to "1.jpg.sext", "2.jpg" to "2.jpg.sext", and so on.

   
RemoteAlgorithm Adware (Mac)

What is RemoteAlgorithm?

Adware serves advertisements, however, RemoteAlgorithm also functions  as a browser hijacker - it changes certain browser settings so that users are forced to visit the address of a fake search engine. Additionally, RemoteAlgorithm can read sensitive information from websites.

Typically, users do not download or install RemoteAlgorithm intentionally and, therefore, this and other similar apps are classified as potentially unwanted applications (PUAs).

   
Rchesasider.top Ads

What is rchesasider[.]top?

rchesasider[.]top is a rogue website designed to present visitors with dubious content and/or redirect them to other untrusted or even malicious pages. The internet is full of similar sites, including pectionexa.topmylot.comundertain.work and finvesterns.work to list just some examples.

Users rarely enter these web pages intentionally - most are redirected to them by intrusive advertisements or by Potentially Unwanted Applications (PUAs) already installed on their devices. These apps do not need explicit user consent to infiltrate systems, and hence users may be unaware of their presence.

PUAs operate by causing redirects, delivering intrusive ad campaigns and collecting browsing-related information.

   
Pectionexa.top Ads

What is pectionexa[.]top?

pectionexa[.]top is one of many websites that users often visit unintentionally. These web pages are promoted by various potentially unwanted applications (PUAs). Note that PUAs also serve ads and gather data. They are classified as PUAs because, in most cases, users download and install them inadvertently.

Some examples of other sites that are similar to pectionexa[.]top include mylot[.]com, ahacdn[.]me and rex-news[.]org.

   
FLAMINGO Ransomware

What kind of malware is FLAMINGO?

FLAMINGO is a ransomware-type program. Systems infected with this malware experience data encryption and users receive ransom demands for decryption. When FLAMINGO encrypts, all affected files are renamed following this pattern: "[developer_email][ID=victim_ID]original_filename.FLAMINGO".

For example, a file originally named "1.jpg" would appear as something similar to "FlamingoRans@tutamail.com][ID=DA833F31]1.jpg.FLAMINGO" following encryption. Additionally, variants of FLAMINGO malware use different email addresses.

Once this process is complete, ransom-demand messages within "#READ ME.TXT" files are dropped into compromised folders.

   
EQSearch Browser Hijacker

What is EQSearch?

EQSearch promotes searcheq.com, the address of a fake search engine. Like most browser hijackers, it achieves this by changing certain browser settings. Commonly, these apps monitor and record details relating to users' browsing habits.

Typically, people download and install browser hijackers inadvertently and, for this reason, EQSearch and other apps of this type are classified as potentially unwanted applications (PUAs).

   
Firmadatalari Ransomware

What is Firmadatalari?

Firmadatalari is a malicious program from the Scarab ransomware family. Like most ransomware-type programs, it encrypts and renames files, and creates a ransom message. Firmadatalari renames files by replacing their filenames with a string of ransom characters and appending the ".firmadatalari" extension.

For example, after encryption, "1.jpg" is renamed to "cYsUOO6xAeJDnQ.firmadatalari", "2.jpg" to "cUdO9986cVgKShW.firmadatalari", and so on. It also creates the "BENI OKU - DOSYA KURTARMA.TXT" text file (ransom message) in all folders that contains encrypted files.

   
Spark Search Browser Hijacker

What is Spark Search?

Spark Search is a browser hijacker which promotes tailsearch.com, a fake search engine. It can also read browsing history. Typically, users download and install browser hijackers inadvertently and, therefore, they are classified as potentially unwanted applications (PUAs).

   
Keysite Browser Hijacker

What is Keysite browser hijacker?

Keysite is rogue software categorized as a browser hijacker. Following successful infiltration, Keysite begins promoting keysearchs.com (a fake search engine). Browser hijackers typically promote bogus search engines by making modifications to browser settings, however, Keysite operates in this manner only in some cases.

Additionally, this browser hijacker monitors users' browsing habits. Due to the dubious methods used to proliferate Keysite, it is also classified as a Potentially Unwanted Application (PUA).

   

Page 1221 of 2337

<< Start < Prev 1221 1222 1223 1224 1225 1226 1227 1228 1229 1230 Next > End >>
About PCrisk

PCrisk is a cyber security portal, informing Internet users about the latest digital threats. Our content is provided by security experts and professional malware researchers. Read more about us.

Malware activity

Global malware activity level today:

Medium threat activity

Increased attack rate of infections detected within the last 24 hours.

Virus and malware removal

This page provides information on how to avoid infections by malware or viruses and is useful if your system suffers from common spyware and malware attacks.

Learn about malware removal