Step-by-Step Malware Removal Instructions

Bestpeacheu.com POP-UP Scam (Mac)
Mac Virus

Bestpeacheu.com POP-UP Scam (Mac)

Typically, websites such as bestpeacheu[.]com are promoted by other bogus websites, dubious ads, or potentially unwanted applications (PUAs). I.e., users do not often visit them intentionally. The main purpose of bestpeacheu[.]com and similar sites is to trick visitors into downloading PUAs.

Private Deep Browser Hijacker
Browser Hijacker

Private Deep Browser Hijacker

Typically, apps that are classified as a browser hijackers change browser settings without users' permission (they assign them to the address of a fake search engine). Private Deep promotes keysearchs.com in this way and also collects browsing history. Users often download and install browser hij

M88P Ransomware
Ransomware

M88P Ransomware

M88P encrypts files and changes the filename of each encrypted file by replacing it with the marco88Polo@criptext.com email address, a string of random characters, and the ".M88P" extension. For example, "1.jpg" is renamed to "[Marco88Polo@criptext.com].2dTJHVkP-KGU2jY25.M88P", "2.jpg" to "[Marco

Fast2captcha.com Ads
Notification Spam

Fast2captcha.com Ads

fast2captcha[.]com is similar to myniceposts[.]com, fastsolvecaptcha[.]com, kersatur[.]online, and many other web pages. Note that users do not often visit these pages intentionally - they are opened by installed potentially unwanted applications (PUAs), through other bogus web pages, or via dubio

DHL Failed Delivery Notification Email Virus
Phishing/Scam

DHL Failed Delivery Notification Email Virus

A popular method used by cyber criminals to deliver malware is to send emails that contain a malicious attachment or download link for a malicious file. Usually, these emails are disguised official, important messages from legitimate companies and organizations. The main purpose of these emails i

TeslaRVNG1.5 Ransomware
Ransomware

TeslaRVNG1.5 Ransomware

TeslaRVNG1.5 belongs to the Ouroboros ransomware family. This ransomware encrypts files and renames them by prepending the victim's ID, tesla369@cock.li email address, and appending ".teslarvng1.5" extension to their filenames (an updated variants use the ".teslarvng2" and ".teslarvng3" extensions

ActivityConfig Adware (Mac)
Mac Virus

ActivityConfig Adware (Mac)

ActivityConfig functions as adware and also as a browser hijacker: it generates advertisements modifies browser settings to promote a fake search engine. It is also likely that this app gathers browsing-related and/or other information. Note that users often download and install ActivityConfig

RansomExx Ransomware
Ransomware

RansomExx Ransomware

RansomExx encrypts files and modifies their filenames by appending a specific extension, which depends on the target name (for example, the name of the organization). Cyber criminals have used this ransomware to attack the Texas Department of Transportation. In this case, encrypted files had the

WARNING CRITICAL MESSAGE POP-UP Scam
Phishing/Scam

WARNING CRITICAL MESSAGE POP-UP Scam

There are many technical support scam websites claiming to be official Microsoft (or other company) websites and claiming that the computer is blocked, infected, or another problem needs to be solved immediately. Commonly, these web pages display pop-up windows instructing potential victims to ca

Streaming plus Browser Hijacker
Browser Hijacker

Streaming plus Browser Hijacker

Streaming plus is a browser hijacker that promotes quicknewtab.com, a fake search engine. Typically, apps of this type promote fake search engines by changing browser settings without users' permission. Browser hijackers also collect browsing data and other information. In most cases, users down