Virus and Spyware Removal Guides, uninstall instructions
What is Perfect Optimizer?
Perfect Optimizer is advertised as software that supposedly repairs, cleans and optimizes the operating system. In fact, this program is distributed in a dubious way and, therefore, is categorized as a potentially unwanted application (PUA). Users often download and install these rogue apps inadvertently.
What is the "BOTAS" email?
"BOTAS" is a spam email campaign designed to proliferate the TrickBot Trojan. These emails are disguised as mail from the Turkish Petroleum Pipeline Corporation (BOTAŞ). The file attached to the emails is disguised as a PDF document, however, this is in fact a malicious executable that installs TrickBot malware.
The primary function of this Trojan is stealing information. TrickBot is a sophisticated piece of malicious software, which has significant anti-detection capabilities. This malware poses a major threat to device and user safety.
What is ModiRat?
ModiRat is a Remote Access Trojan (RAT) which allows cyber criminals to control infected systems remotely.
In most cases, this type of malware is used to access personal files, steal login credentials, and install additional malware. Note that most RATs do not appear in the list of running processes or active programs, and therefore victims could have malware present on their computers for long periods of time without their knowledge.
What is ResultsSearchTool?
ResultsSearchTool promotes a fake search engine by changing browser settings. It also displays advertisements. Therefore, this app functions both as adware and a browser hijacker.
Commonly, apps of this type collect browsing-related and other data. Note that ResultsSearchTool is distributed through a deceptive Adobe Flash Player installer, and is therefore often installed without users' consent.
What is Gdjlosvtnib?
Discovered by GrujaRS, Gdjlosvtnib is malicious software (malware) belonging to the Snatch ransomware family. Systems infected with this ransomware experience data encryption and users receive ransom demands for decryption. During the encryption process, all affected file are appended with the ".gdjlosvtnib" extension.
For example, a file originally named something like "1.jpg" would appear as "1.jpg.gdjlosvtnib" following encryption. After this process is complete, a ransom message ("HOW TO RESTORE YOUR FILES.TXT") is dropped into compromised folders.
What is the VanTom RAT?
VanTom is a Remote Access Trojan (RAT) based on njRat malware. Malicious programs classified as RATs allow remote access and control over an infected machine. These Trojans can have a wide variety of functionalities, which can enable likewise varied misuse.
The VanTom RAT is a highly dangerous piece of software that poses a significant threat to device integrity and user safety.
What is VideozSearchs?
VideozSearchs hijacks browsers by changing settings to feed.videoz-searchs.com (the address of a fake search engine). Additionally, this app might be designed to collect data relating to users' browsing habits. Generally, people download and install these apps unintentionally and, for this reason, they are categorized as potentially unwanted applications (PUAs).
What is TELEGRAM?
Discovered by GrujaRS, TELEGRAM is a new variant of NEFILIM ransomware. Systems infected with this ransomware have their data encrypted and users receive ransom demands for decryption. During the encryption process, all affected files are appended with the ".TELEGRAM" extension.
For example, a file originally named something like "1.jpg" would appear as "1.jpg.TELEGRAM" following encryption. Once this process is complete, text files ("TELEGRAM-RECOVER.txt") are dropped into compromised folders. These files contain the ransom message.
What is SearchConverterz?
SearchConverterz is a typical browser hijacker - it promotes a fake search engine by changing certain browser settings (in this case, assigning them to feed.searchconverterz.com).
These apps also gather browsing-related information. Users often download and install browser hijackers inadvertently and, therefore, they are categorized as potentially unwanted applications (PUAs).
What is "Payments Due email virus"?
Typically, malspam campaigns are disguised as legitimate and official in attempts to make them seem less suspicious.
Cyber criminals send bogus emails to trick recipients into clicking the included link (thereby downloading and opening a malicious file) or simply opening/executing the attached file. In any case, when the malicious file is executed, it installs malware onto the recipient's computer. This particular malspam campaign is used to distribute a Trojan named Gozi.
More Articles...
Page 1332 of 2329
<< Start < Prev 1331 1332 1333 1334 1335 1336 1337 1338 1339 1340 Next > End >>