Step-by-Step Malware Removal Instructions

Mundinter Email Virus
Phishing/Scam

Mundinter Email Virus

In most cases, cyber criminals behind malspam campaigns disguise their messages as official and important, and sent from legitimate companies and organizations. Their main goal is to trick recipients into opening a malicious file attached to the email (or that can be downloaded through a link in t

Connection-protect.com POP-UP Scam (Mac)
Mac Virus

Connection-protect.com POP-UP Scam (Mac)

connection-protect[.]com is a deceptive website, which promotes various scams. It has been observed promoting schemes that target Apple product users, primarily mobile device users. At the time of research, the scam run on connection-protect[.]com claimed that visitors' devices may have been com

Anubis Stealer
Trojan

Anubis Stealer

Anubis is malware classified as an information stealer. It can be purchased on a hacker forum (starting from US$100). Cyber criminals can use it to steal cryptocurrency wallets, and information such as browsing cookies and passwords saved on browsers, and credit card details. Therefore, if there

StreamBrosSearch Browser Hijacker
Browser Hijacker

StreamBrosSearch Browser Hijacker

StreamBrosSearch is rogue software classified as a browser hijacker. Following successful infiltration, it makes changes to browser settings to promote streambrossearch.com (a fake search engine). Additionally, StreamBrosSearch monitors users' browsing habits. Due to the dubious tactics employed

ViluciWare Ransomware
Ransomware

ViluciWare Ransomware

Discovered by JAMESWT, ViluciWare is designed to encrypt files, modify their filenames and prevent victims from using the computer (operating system) by locking the screen. In this way, ViluciWare functions as ransomware and a screenlocker. Research shows that it renames encrypted files by appendi

FDFK22 Ransomware
Ransomware

FDFK22 Ransomware

FDFK22 belongs to the Matrix ransomware family. Like other malicious programs of this type, FDFK22 is designed to prevent victims from accessing their files by encryption. It renames all encrypted files by replacing filenames with the FridaFarko@yahoo.com email address, a string of random characte

OperativeDevice Adware (Mac)
Mac Virus

OperativeDevice Adware (Mac)

OperativeDevice is dubious software categorized as adware. It also has browser hijacker traits. It operates by delivering intrusive advertisement campaigns and making alterations to browser settings to promote fake search engines. OperativeDevice promotes 0yrvtrh.com and the search.adjustablesam

SkilledOrigin Adware (Mac)
Mac Virus

SkilledOrigin Adware (Mac)

SkilledOrigin is a potentially unwanted application (PUA), which serves advertisements and collects sensitive information. SkilledOrigin is categorized as a PUA, since users often download and install this type of adware inadvertently. Note that this app might also be designed to promote a fake

WinkiSearch Browser Hijacker
Browser Hijacker

WinkiSearch Browser Hijacker

The WinkiSearch browser hijacker promotes winki-search.com (a fake search engine) by changing certain browser settings. It also gathers browsing-related information. Note that users often download and install browser hijackers inadvertently and, for this reason, they are classified as potentially

Mol.biz Ads
Notification Spam

Mol.biz Ads

mol[.]biz websites (similar variations include mol1[.]biz, mol2[.]biz, mol3[.]biz, etc.) are designed to promote (open) untrusted web pages or display dubious content. There are many websites of this type, including, for example, hipermovies[.]icu, gdanstum[.]net and vviewpoint[.]biz. Note that m