Step-by-Step Malware Removal Instructions

Tejodes Ransomware
Ransomware

Tejodes Ransomware

Tejodes ransomware is designed to encrypt files, modify filenames and provide instructions about how to pay a ransom. It renames encrypted files by appending the ".tejodes" extension. For example, it would rename "1.jpg" to "1.jpg.tejodes", "2.jpg" to "2.jpg.tejodes", and so on. Instructions abou

Police Ransomware
Ransomware

Police Ransomware

Police is a malicious program classified as ransomware. This malware is designed to encrypt data and demand payment for decryption. During the encryption process, all affected files are appended with the ".Police" extension. For example, a file originally named something like "1.jpg" would appear

Your Email Is Out Of Date Email Scam
Phishing/Scam

Your Email Is Out Of Date Email Scam

Typically, cyber criminals behind phishing emails such as this attempt to deceive individuals into providing sensitive information. For example, personally identifiable information, banking, credit card details, login credentials (usernames, passwords), etc. In this particular case, cyber criminal

OriginalEngineSearch Adware (Mac)
Mac Virus

OriginalEngineSearch Adware (Mac)

OriginalEngineSearchn is an adware-type application with browser hijacker traits. Following successful installation, it runs intrusive advertisement campaigns and makes alterations to browser settings to promote fake search engines. Most apps of this type (adware and browser hijackers) have data

SSHBOT Screenlocker
Ransomware

SSHBOT Screenlocker

Discovered by Karsten Hahn, SSHBOT (also known as P4YME) is a screenlocker - malware that locks computers. The main purpose of SSHBOT is to ensure that victims are unable to access the Windows desktop or use installed programs, files, etc., unless they pay a ransom to the cyber criminals responsib

Kutaki Keylogger
Trojan

Kutaki Keylogger

Kutaki is a typical keylogger (keystroke logger) software that captures keyboard input. Cyber criminals use programs of this type to steal sensitive information, which can be misused to generate revenue in various ways. Victims are often unaware that their actions are being monitored. If Kutaki o

Aim Ransomware
Ransomware

Aim Ransomware

Aim is malware belonging to a family of ransomware called Dharma. It renames all encrypted files by adding the victim's ID, the Smith1@mailfence.com email address and appending the ".Aim" extension to filenames. For example, "1.jpg" would become "1.jpg.id-C279F237.[Smith1@mailfence.com].Aim", "2.j

Your Account Has Encountered An Error 505 Email Scam
Phishing/Scam

Your Account Has Encountered An Error 505 Email Scam

"Your account has encountered an error 505" refers to a spam campaign distributing phishing emails. The term "spam campaign" is used to define a large-scale operation, during which thousands of deceptive/scam emails are sent. The messages distributed through this spam campaign claim that recipient

XCSSET Malware (Mac)
Mac Virus

XCSSET Malware (Mac)

XCSSET is malicious software designed to steal various information and capable of operating as ransomware. Some of the main functionality of this malware includes modification of displayed websites, stealing of log-in credentials (i.e. usernames and passwords) and other data relating to browsin

My Apps Center Browser Hijacker
Browser Hijacker

My Apps Center Browser Hijacker

My Apps Center is a browser hijacker designed to promote hmyappscenter.net (the address of a fake search engine) by modifying certain browser settings. These apps also function as information tracking tools (they gather browsing-related and other data). Note that My Apps Center is distributed wit