Virus and Spyware Removal Guides, uninstall instructions

Geofoxip.com Redirect (Mac)

What is geofoxip.com?

geofoxip.com is a fake search engine that claims to enhance the browsing experience by generating improved results and providing quick access to various popular websites.

Users often believe that this site is legitimate and useful, however, developers promote geofoxip.com using rogue download/installation set-ups that modify browser settings without users’ permission. Furthermore, this site continually records information relating to browsing activity. Results generated by geofoxip.com might also lead to other dubious sites.

   
Hydrotech Email Virus

What is "Hydrotech Email Virus"?

Discovered by My Online Security, "Hydrotech Email Virus" is a scam that is presented as an official message (invoice) from HYDROTECH. The main purpose of this scam is to trick people into opening the included attachments, which are designed to download and install the Remcos RAT (remote access tool).

Cyber criminals use these tools to generate revenue by stealing personal details, downloading and installing malicious programs, and so on. We strongly recommend that you leave files attached to "Hydrotech Email Virus" message and other similar spam campaigns (scams) unopened.

   
Truke Ransomware

What is Truke?

Belonging to the Djvu ransomware family, Truke is yet another ransomware infection discovered by Michael Gillespie. Once infiltrated, Truke encrypts most stored data and appends filenames with the ".truke" extension (e.g., "sample.jpg" becomes "sample.jpg.truke"). Encrypted data immediately becomes unusable.

Following successful encryption, Truke generates a text file ("_readme.txt") and stores a copy in every existing folder.

   
Litra Ransomware

What is Litra?

Litra ransomware was discovered by S!Ri and, like many other programs of this type, is designed by cyber criminals to blackmail people.

Litra encrypts files/data and displays a pop-up window that contains instructions about how to pay a ransom. Additionally, this ransomware renames all encrypted files by adding the ".litra" extension. For example, "1.jpg" becomes "1.jpg.litra".

   
LoudMiner Virus (Mac)

What is LoudMiner?

LoudMiner is a cryptocurrency miner based on XMRig (another miner) and designed to mine Monero cryptocurrency. LoudMiner is cross-platform software, and thus can run on different operating systems such as MacOS, Linux, and Windows. It is distributed by bundling it with set-ups of pirated (cracked) copies of VST (Virtual Studio Technology) software.

Cyber criminals who proliferate LoudMiner attempt to trick people into installing this rogue software so they can misuse their computers (computer resources) to mine cryptocurrency. If LoudMiner miner is installed on your operating system, remove it immediately.

   
Dalle Ransomware

What is Dalle?

First discovered by malware researcher, Michael Gillespie, Dalle is a high-risk ransomware infection that belongs to the Djvu ransomware family.

Dalle is designed to stealthily infiltrate computers and encrypt most stored files. During encryption, Dalle appends filenames with the ".dalle" extension (hence its name). Encrypted data immediately becomes unusable. Additionally, Dalle creates a text file called "_readme.txt" and stores a copy in every existing folder.

   
Flvto.biz Virus

What is flvto[.]biz?

The flvto[.]biz website that allows conversion of videos downloaded from YouTube into MP3, MP4, and AVI format files free of charge. To achieve this, users must paste a video URL into the flvto[.]biz website and choose the file format.

Downloading and converting videos from YouTube using this website is not dangerous (it cannot harm computers), however, these actions are illegal. Furthermore, this website uses advertising networks, and thus users can be redirected to other dubious or malicious websites. Therefore, we recommend that you avoid using flvto[.]biz.

   
Predator The Thief Malware

What is Predator The Thief?

Predator The Thief is high-risk trojan-type infection designed to collect various user-system information. These infections typically infiltrate computers without users' consent. Their presence might lead to serious privacy issues and significant financial loss.

   
MacAppExtensions Browser Hijacker (Mac)

What is MacAppExtensions?

MacAppExtensions is a potentially unwanted application (PUA), a browser app installed by adware-type apps that are already present on the Mac system or browser. Once installed, MacAppExtensions hijacks browsers (changes settings) and gathers information relating to users' browsing activity.

   
Likeherlife.info Ads

What is likeherlife[.]info?

The likeherlife[.]info website displays dubious content or redirects visitors to other untrustworthy web pages. It is virtually identical to many other sites of this type such as bikereddint[.]info, suaningrebtersed[.]info, and newschanel[.]biz.

Generally, people do not arrive at these websites intentionally - they are opened by potentially unwanted applications (PUAs) installed on browsers or operating systems. Most PUAs gather information relating to users' browsing habits and deliver unwanted, deceptive ads.

   

Page 1602 of 2329

<< Start < Prev 1601 1602 1603 1604 1605 1606 1607 1608 1609 1610 Next > End >>
About PCrisk

PCrisk is a cyber security portal, informing Internet users about the latest digital threats. Our content is provided by security experts and professional malware researchers. Read more about us.

Malware activity

Global malware activity level today:

Medium threat activity

Increased attack rate of infections detected within the last 24 hours.

Virus and malware removal

This page provides information on how to avoid infections by malware or viruses and is useful if your system suffers from common spyware and malware attacks.

Learn about malware removal