Virus and Spyware Removal Guides, uninstall instructions

Appnewtab Browser Hijacker

What is Appnewtab?

Appnewtab is a browser hijacker, which promotes barosearch.com, the address of a fake search engine by modifying certain browser settings. It is also capable of collecting information relating to users' browsing activities (browsing data).

Users often download and install browser hijackers unintentionally and, therefore, they are categorized as potentially unwanted applications (PUAs).

   
AdjustableView Adware (Mac)

What is AdjustableView?

AdjustableView is an adware-type application with browser hijacker traits. It operates by delivering intrusive advertisement campaigns, making modifications to browser settings to promote fake search engines. AdjustableView promotes 0yrvtrh.com on Safari browsers and search.adjustablesample.com on Google Chrome browsers.

Additionally, most adware-type apps and browser hijackers collect browsing-related information. Due to the dubious techniques used to proliferate AdjustableView, it is classified as a Potentially Unwanted Application (PUA).

   
Suncrypt Ransomware

What kind of malware is Suncrypt?

Discovered by GrujaRS, Suncrypt ransomware prevents victims from accessing files by encryption. It also renames all encrypted files and creates a ransom message. It renames encrypted files by appending a string of random characters as the new extension.

For example, Suncrypt would rename a file called "1.jpg" to "1.jpg.F3F2420C68439B451670486B17EF6D1B0188A7982E7A9DBD9327E7F967C15767", a file named "2.jpg" to "2.jpg.G4D3519X58293C283957013M35DC8A2V0748D9845E7A5DBD6590E3F834C4638", and so on.

It also creates the "YOUR_FILES_ARE_ENCRYPTED.HTML" file (ransom message) in all folders that contain encrypted files.

   
FieldIndexer Adware (Mac)

What is FieldIndexer?

FieldIndexer is classified as adware, since it feeds users with various advertisements. Commonly, apps of this type collect information relating to users' browsing habits, and this might also be the case with FieldIndexer. Additionally, it could be designed to promote a fake search engine (function as a browser hijacker).

In most cases, users download and install adware inadvertently and, for this reason, the programs are classified as potentially unwanted applications (PUAs).

   
StreamSaloon Browser Hijacker

What is StreamSaloon?

StreamSaloon is a browser hijacker designed to change certain browser settings to the address a fake search engine (streamsaloon.com). Additionally, it might collect information relating to users' browsing activities.

Generally, users download and install apps such as StreamSaloon (browser hijackers) inadvertently and, therefore, they are classified as potentially unwanted applications (PUAs)

   
PublicBoardSearch Adware (Mac)

What is PublicBoardSearch?

PublicBoardSearch is rogue software classified as adware. This app also has browser hijacker traits. PublicBoardSearch operates by delivering intrusive advertisement campaigns and making modifications to browsers to promote fake search engines.

Additionally, most adware-type apps and browser hijackers monitor users' browsing activity. Due to the dubious methods used to proliferate PublicBoardSearch, it is classified as a Potentially Unwanted Application (PUA). One of the techniques used to proliferate PublicBoardSearch is via bogus Adobe Flash Player updates.

Note that fake software updaters/installers are employed to spread PUAs, Trojans, ransomware and other malware.

   
NW24 Ransomware

What is NW24?

NW24 belongs to the Dharma ransomware family and was discovered by Jakub Kroustek. This ransomware encrypts files, renames them and provides victims with instructions about how to contact the developers. NW24 renames files by adding the victim's ID, newhelper24@protonmail.ch email address and appending the ".NW24" extension to filenames.

For example, it would rename "1.jpg" file to "1.jpg.id-C279F237.[newhelper24@protonmail.ch].NW24", "2.jpg" to "2.jpg.id-C279F237.[newhelper24@protonmail.ch].NW24", etc. Instructions about how to contact the cyber criminals behind this ransomware are provided in the pop-up window and "FILES ENCRYPTED.txt" text file (ransom messages).

   
SearchConverters Browser Hijacker

What is SearchConverters?

SearchConverters is a browser hijacker, which operates by making changes to browser settings to promote a fake search engine (search-converters.com). This software also monitors users' browsing habits. Additionally, due to the dubious techniques used to proliferate SearchConverters, it is classified as a Potentially Unwanted Application (PUA).

   
StreamBeeSearch Browser Hijacker

What is StreamBeeSearch?

StreamBeeSearch assigns certain browser settings to streambeesearch.com, the address of a fake search engine. Note that apps of this type often track information (collect various browsing-related data). Users often download and install browser hijackers inadvertently and, for this reason, they are classified as potentially unwanted applications (PUAs).

   
Nico International Email Virus

What is the "Nico International" scam email?

"Nico International Email Virus" refers to a spam email campaign designed to proliferate the Agent Tesla RAT (Remote Access Trojan). The term "spam campaign" is used to define a large-scale operation, during which thousands of deceptive emails are sent.

The messages distributed through this spam campaign are disguised as mail from Nico International - a legitimate company operating in the marine and industrial engineering spheres (shipbuilding and repair), which is based in Dubai, United Arab Emirates.

These scam emails ask recipients to verify a purchase order, however, upon opening the file attached to the messages, the infection process of Agent Tesla is triggered. These fake "Nico International" emails are not associated in any way with the genuine Nico International company.

   

Page 1286 of 2331

<< Start < Prev 1281 1282 1283 1284 1285 1286 1287 1288 1289 1290 Next > End >>
About PCrisk

PCrisk is a cyber security portal, informing Internet users about the latest digital threats. Our content is provided by security experts and professional malware researchers. Read more about us.

Malware activity

Global malware activity level today:

Medium threat activity

Increased attack rate of infections detected within the last 24 hours.

Virus and malware removal

This page provides information on how to avoid infections by malware or viruses and is useful if your system suffers from common spyware and malware attacks.

Learn about malware removal