Virus and Spyware Removal Guides, uninstall instructions

VIRAL ALARM OF MICROSOFT POP-UP scam

What is "VIRAL ALARM OF MICROSOFT"?

"VIRAL ALARM OF MICROSOFT" is a fake alert, displayed by deceptive, rogue websites. It is used to scare users into thinking that their computer is blocked, due to a variety of issues. It promotes fraudulent Microsoft Windows technical support, which if used will eventually require payment.

In most cases, such dubious sites are opened by PUAs (potentially unwanted applications) already present in the device. These apps do not need express user permission to be installed onto their systems.

They operate by generating redirects to untrustworthy and potentially malicious websites (for example, ones that display messages like "VIRAL ALARM OF MICROSOFT"), also by delivering intrusive advertisement campaigns and spying on users' browsing activity.

   
PowerLog Virus (Mac)

What is PowerLog?

PowerLog is an adware-type app and part of the Pirrit family. After installation, PowerLog installs another app of this type called MacPerformance. This app forces browsers to open web pages that offer updates to software with fake tools. Adware is software designed to display various ads.

In some cases, these apps can be used to record user-system (and other) information. Typically, people download and install adware inadvertently. Therefore, these programs are categorized as potentially unwanted applications (PUAs).

   
PowerLift Virus (Mac)

What is PowerLift?

PowerLift is the name of an application classified as adware. When installed, adware-type apps feed users with unwanted, often deceptive advertisements. In some cases, they collect information relating to users' browsing habits. Generally, people download and install adware unintentionally.

Therefore, these apps are categorized as potentially unwanted applications (PUAs). PowerLift installs another adware-type app called MacPerformance. This app displays pop-ups with offers for users to update their software. It is very likely that these pop-ups will distribute other PUAs.

   
Universal PC Care Unwanted Application

What is Universal PC Care?

Universal PC Care is a software, supposedly capable of optimizing and speeding up computers (e.g. fixing errors, making various system enhancements, getting rid of unnecessary programs/files, detecting and removing threats and etc.).

Universal PC Care is often distributed with other programs as a supplement, i.e. it is "bundled" inside the download/installation setups of other software.

Such false marketing tactics ("bundling") frequently trick users into downloading/installing undesirable content. Which is why Universal PC Care and other software similar to it, are classified as PUAs (potentially unwanted applications).

   
Moka Ransomware

What is Moka?

Moka is a part of the Djvu ransomware family and was discovered by Michael Gillespie. Like most programs of this type, Moka encrypts files to prevent access. To regain access, victims must pay ransoms to cyber criminals (i.e., purchase a decryption tool).

Moka renames all encrypted files by changing extensions to ".moka". For example, "1.jpg" becomes "1.jpg.moka". It also creates a ransom message within a text file called "_readme.txt".

   
OpticDaemon Virus (Mac)

What is OpticDaemon?

OpticDaemon is an adware-type app belonging to the Pirrit adware family. It displays unwanted advertisements and installs another adware program called MacPerformance. Additionally, OpticDaemon forces browsers to display pop-up windows that offer updates to installed software (using fake updating tools).

Typically, people do not download and/or these install apps intentionally. Therefore, they are categorized as potentially unwanted applications (PUAs) and are often designed to gather user-system information.

   
LightAgent Virus (Mac)

What is LightAgent?

Belonging to the Pirrit adware family, LightAgent is an adware-type potentially unwanted application (PUA). Many people download and install apps of this type inadvertently. LightAgent installs additional adware, an app called MacPerformance, and tricks people into updating software with fake update tools.

Typically, adware-type apps force browsers to display unwanted apps, however, they sometimes also collect data relating to users' browsing habits.

   
DisplayUpdate Virus (Mac)

What is DisplayUpdate?

DisplayUpdate is an adware-type application and part of the Pirrit adware family. DisplayUpdate installs other adware called MacPerformance (also belonging to the Pirrit family) on Mac computers. When installed, adware-type apps feed users with unwanted advertisements and sometimes collect user-system information.

Furthermore, DisplayUpdate opens pop-up windows that offer to update software using various tools (these are actually fake).

   
Celeb-secret.live Ads

What is celeb-secret[.]live?

Celeb-secret[.]live is a rogue website, practically identical to mediasource.onlinedreamteammyfriend.comvideosp.pro and many others. It operates by generating redirects to compromised and possibly malicious sites, as well as presents users with highly dubious content (including clickbait).

It is noteworthy, that few visitors to celeb-secret[.]live access it willingly, most get redirected to it. Either by clicking on intrusive advertisements (usually hosted by unreliable sites) or by PUAs (potentially unwanted applications) already present in the device. It should be mentioned, that said undesirable applications do not need explicit user consent to be installed onto systems.

PUAs generate redirects to untrustworthy and malignant websites, deliver invasive ad campaigns and some can even track data.

   
Kokoklock Ransomware

What is Kokoklock?

Kokoklock is software categorized as ransomware. This malicious program was discovered by GrujaRS. Ransomware-type programs encrypt files with strong encryption algorithms. To regain access to their files, victims are encouraged to buy a decryption tool and/or key from the cyber criminals who designed the ransomware.

Kokoklock renames all files by adding an email address and a random extension to the filenames. For example, "sample.jpg" might be renamed to a filename such as "sample.jpg.mailto[kokoklock@cock.li].1a9296".

The filename of the text file containing the ransom message has the same format as the extension added to all encrypted files. In this case, the text file would be named "1A9296-Readme.txt".

   

Page 1557 of 2334

<< Start < Prev 1551 1552 1553 1554 1555 1556 1557 1558 1559 1560 Next > End >>
About PCrisk

PCrisk is a cyber security portal, informing Internet users about the latest digital threats. Our content is provided by security experts and professional malware researchers. Read more about us.

Malware activity

Global malware activity level today:

Medium threat activity

Increased attack rate of infections detected within the last 24 hours.

Virus and malware removal

This page provides information on how to avoid infections by malware or viruses and is useful if your system suffers from common spyware and malware attacks.

Learn about malware removal