Step-by-Step Malware Removal Instructions

NOV Ransomware
Ransomware

NOV Ransomware

NOV is a type of malware that prevents victims from accessing their files: it encrypts files and keeps them inaccessible unless victims pay a ransom. This ransomware encrypts files and renames them by adding the victim's ID, yourfiles1@cock.li email address, and appending the ".NOV" extension to

Idecrypt Ransomware
Ransomware

Idecrypt Ransomware

Idecrypt is a ransomware-type program, which is part of the VoidCrypt malware family. Systems infected with Idecrypt experience data encryption and users receive ransom demands for decryption. During the encryption process, files are renamed according to this pattern: original filename, cyber cri

Keepv.id Suspicious Website
Adware

Keepv.id Suspicious Website

keepv[.]id is an untrusted website, which operates as a YouTube converter. This page offers a service to convert YouTube video URLs (links) to MP3 and MP4 files, which users can download. As well as this service infringing copyright law, it also uses rogue advertising networks. Sites that employ

Gogoanime.so Suspicious Website
Adware

Gogoanime.so Suspicious Website

gogoanime[.]so is an anime streaming site, however, this page does not have the rights for the anime shows they stream, and so it streams anime illegally. Another problem with this page is that it uses rogue advertising networks: it contains deceptive, dubious advertisements and redirects users to

Secure (Scarab) Ransomware
Ransomware

Secure (Scarab) Ransomware

Secure is a malicious program that belongs to the Scarab ransomware family. This malware encrypts data and demands payment for decryption. During the encryption process, all affected files are renamed with a random character string and the ".secure" extension. For example, a file originally named

Cukiesi Ransomware
Ransomware

Cukiesi Ransomware

Cukiesi encrypts files and appends "_cU{victim's_ID}Cukiesi" to their filenames. For example, "1.jpg" is renamed to "1.jpg_cU{zvsOEJ}Cukiesi", "2.jpg" to "2.jpg_cU{zvsOEJ}Cukiesi", and so on. Cukiesi also creates the "nooode.txt" text file in each folder that contains encrypted files. That file c

MicroClick Adware (Mac)
Mac Virus

MicroClick Adware (Mac)

MicroClick functions as adware and a browser hijacker: it makes certain changes to browser settings and displays advertisements. This app might also gather browsing-related (and other) information. Commonly, users download and install apps such as MicroClick inadvertently and, therefore, they a

TigerMovieSearch Browser Hijacker
Browser Hijacker

TigerMovieSearch Browser Hijacker

TigerMovieSearch is rogue software categorized as a browser hijacker. It operates by making modifications to browser settings to promote tigermoviesearch.com (a bogus search engine). Additionally, most browser hijackers monitor users' browsing activity - it is likely that TigerMovieSearch has thes

Zero Day Security Vulnerability On Zoom App Email Scam
Phishing/Scam

Zero Day Security Vulnerability On Zoom App Email Scam

"Zero day security vulnerability on Zoom app" is a spam campaign that uses the sextortion scam model. The term "spam campaign" defines a mass-scale operation during which thousands of deceptive emails are sent. The messages distributed through this campaign claim that the sender has obtained highl

METZA Email Virus
Phishing/Scam

METZA Email Virus

Malspam emails such as this one usually contain a download link or malicious attachment. The emails can be used to deliver ransomware, Trojans, crypto miners, spyware and keyloggers, and other malware. This particular malspam message is used to deliver Agent Tesla, a Remote Administration Tool (RA