Step-by-Step Malware Removal Instructions

Search.pricklybears.com Redirect (Mac)
Mac Virus

Search.pricklybears.com Redirect (Mac)

search.pricklybears.com is the address of a fake search engine. Typically, fake search engines are promoted through various potentially unwanted applications (PUAs), browser hijackers. Applications of this type promote fake search engines by changing certain browser settings. Furthermore, most

Kodc Ransomware
Ransomware

Kodc Ransomware

Discovered by Michael Gillespie, Kodc is a malicious program belonging to the Stop/Djvu ransomware family. Systems infected with this malware have data encrypted and their respective users receive ransom demands for decryption. When Kodc ransomware encrypts, all files are appended with the ".kodc"

UpgradeStart Adware (Mac)
Mac Virus

UpgradeStart Adware (Mac)

UpgradeStart is a potentially unwanted application (PUA), an adware-type app that supposedly improves the browsing experience. In fact, adware serves various advertisements. Furthermore, applications such as UpgradeStart also gather information. People generally download and install adware unint

BWNG Ransomware
Ransomware

BWNG Ransomware

BWNG belongs to the Matrix ransomware family. It encrypts victim's files, changing the filenames, and also stores several additional files on the desktop. BWNG renames each encrypted file using the following pattern: "[billwong73@yahoo.com].[random_string].BWNG", thus making them indistinguishable

Mark Ransomware
Ransomware

Mark Ransomware

Mark is malicious software and a variant of Paradise ransomware. Systems infected with this malware have their data encrypted and users receive ransom demands for decryption tools/software. During the encryption process, files are renamed according to the following pattern: original title, the wo

5SS5C Ransomware
Ransomware

5SS5C Ransomware

Discovered by malware researcher, Onion, 5ss5c is malicious software and an updated variant of Satan ransomware. It operates by encrypting data and demanding payment for decryption. When 5ss5c ransomware encrypts, all affected files are renamed according to the following pattern: "[5ss5c@mail.ru][

YOU ARE THE CHOSEN! POP-UP Scam
Phishing/Scam

YOU ARE THE CHOSEN! POP-UP Scam

"YOU ARE THE CHOSEN!" is a scam run by deceptive websites. It claims that visitors have been chosen and can win a special reward. These scams are simply intended to generate revenue for their designers. They must never be trusted, as doing so can lead to serious issues. Sites that promote "YOU AR

Install-plug-s3.com POP-UP Scam (Mac)
Mac Virus

Install-plug-s3.com POP-UP Scam (Mac)

install-plug-s3[.]com is designed by scammers who seek to deceive unsuspecting visitors into installing potentially unwanted applications (PUAs), such as browser hijackers, adware or other apps of this kind, through a fake Adobe Flash Player installer. In some cases, these websites are used to s

JhoneRAT Virus
Trojan

JhoneRAT Virus

JhoneRAT is the name of a Remote Access Tool (Trojan), which is distributed through malicious Microsoft Office documents. Cyber criminals behind it target Arabic-speaking users. This malicious program selects (by filtering) victims by checking the keyboard layout of their computers. JhoneRAT is c

You Have (1) Package Waiting POP-UP Scam
Phishing/Scam

You Have (1) Package Waiting POP-UP Scam

"You have (1) package waiting" is a scam run by deceptive websites. Under the guise of an official delivery tracking site, the scam claims that visitors have packages waiting for them. The purpose of this scheme is to trick users into making a monetary transaction, a fake delivery fee. All inform