Virus and Spyware Removal Guides, uninstall instructions
What is RMS Rat?
RMS Rat is a high-risk virus that stealthily infiltrates the system and grants cyber criminals remote access to victims' computers. At time of research, RMS Rat was distributed using fake Adobe Flash Player and Adobe Acrobat Reader updaters/installers promoted via deceptive websites. This distribution campaign was first discovered by Maelstrom Security.
What is Pitou?
Pitou is a trojan, a malicious program that sends spam emails from the infected computer. This is useful for cyber criminals, since people who receive messages from people in their contact list often believe that the emails are harmless. Note, however, that this trojan can send emails that proliferate other malicious programs.
What is Lotep?
Belonging to the Djvu ransomware family, Lotep is a high-risk ransomware infection discovered by Michael Gillespie. After successful infiltration, Lotep encrypts most stored data and appends filenames with the ".lotep" extension. For example, "sample.jpg" is renamed to "sample.jpg.lotep".
Files are encrypted so that Lotep's developers can blackmail victims by offering paid recovery. Once data is encrypted, Lotep generates a text file ("_readme.txt") and stores a copy in every existing folder. This text file contains a ransom-demand message identical to those delivered by other infections from the Djvu family.
What is iPhone Has Been Locked?
"iPhone Has Been Locked" is a fake error message displayed by various malicious sites. It is very similar to to Your Mac Is Infected With 3 Viruses, Please Call Apple Support, and many others.
Research shows that users typically visit deceptive sites inadvertently - they are redirect by intrusive advertisements (delivered by other rogue sites) or potentially unwanted programs (PUPs), which infiltrate systems without permission. Most PUPs are also designed to record user-system information and deliver intrusive advertisements.
What is Inlog Optimizer?
The Inlog Optimizer program supposedly cleans Windows Operating Systems and improves performance. It includes features that allow users to disable Microsoft Compatibility Telemetry, receive updates, adjust startup items, remove programs and unnecessary files, and so on.
In fact, this program is classified as a potentially unwanted application (PUA). Developers bundle PUAs into set-ups of other software. Therefore, people often download and install them inadvertently.
What is cbs0z?
Discovered by Petrovic, Cbs0z belongs to the Snatch ransomware family (its previous variant is called Hceem). Cbs0z is designed to encrypt files (rendering them unusable) and keep them in that state unless a ransom is paid. The ransom message can be found in the "RESTORE_CBS0Z_DATA.txt" text file.
Like most programs of this type, cbs0z renames encrypted files. In this case, it appends the ".cbs0z" extension. For example, "1.jpg" becomes "1.jpg.cbs0z".
What is BWplayer?
BWplayer is promoted as a tool that supposedly delivers 'useful' features and functions. In fact, it is classified as a potentially unwanted application (PUA) and an adware-type program. Apps of this type usually display advertisements and sometimes also record user-system information.
What is TROLL?
Discovered by Michael Gillespie, TROLL is one of many programs classified as ransomware - malicious software that denies access to files by encryption. Cyber criminals use TROLL to force people to pay ransoms. Furthermore, it renames all encrypted files by adding the ".TROLL" extension to each filename.
For example, "1.jpg" becomes "1.jpg.TROLL". Information about how to decrypt data is provided in the "HOW TO BACK YOUR FILES.txt" text file. This file is stored in all folders that contain locked (encrypted) files.
What is ZUpdater.exe?
The zupdate error pop-up window normally states that an error occurred while creating the ZUpdater.exe process and is due to malware such as a trojan, or a virus that has infected the computer.
According to this system pop-up window, however, the error occurred due to insufficient system resources necessary to complete the requested service. If a computer is infected with one of the these malicious programs, it should be removed immediately.
What is WALAN?
First discovered by malware researcher, Michael Gillespie, WALAN is a high-risk ransomware infection designed to encrypt data so that victims are unable to use it.
During encryption, WALAN renames each file by appending the ".WALAN" extension (for example, "sample.jpg" becomes "sample.jpg.WALAN"). Following successful encryption, WALAN creates a text file called "DECRYPT_INFO.txt" and stores a copy in every existing folder.
More Articles...
Page 1601 of 2329
<< Start < Prev 1601 1602 1603 1604 1605 1606 1607 1608 1609 1610 Next > End >>