Step-by-Step Malware Removal Instructions

Videostream.best Ads
Notification Spam

Videostream.best Ads

videostream[.]best is one of many rogue websites designed to redirect visitors to other web pages of this kind, or to load dubious content. Some other examples include loading-wsite[.]com, private-show[.]live, and sonagerthrou[.]com. Generally, browsers open these sites when potentially unwanted

Mispadu Trojan
Trojan

Mispadu Trojan

Mispadu (also known as URSA) is the name of a banking Trojan. Cyber criminals behind this software target people living in Brazil, Spain and Mexico. They seek to steal credentials, credit card and banking data. Research shows that this malware is distributed through spam campaigns and malicious a

Loading-wsite.com Ads
Notification Spam

Loading-wsite.com Ads

loading-wsite[.]com is a rogue site sharing similarities with private-show.live, bestflowingstuff.co, 1backlinks.com, and many others. It presents visitors with dubious content and generate redirects to other, untrustworthy and malicious web pages. Few visitors to these websites enter them willin

NUKESPED Trojan (Mac)
Mac Virus

NUKESPED Trojan (Mac)

NUKESPED is a backdoor Trojan, which targets Mac users in Korea. The group of cyber criminals who designed and spread this malware is called Lazarus.  They distributed this malicious software through an Excel document using a Mac App bundle, which contains legitimate and malicious versions of A

Bitcore Ransomware
Ransomware

Bitcore Ransomware

Discovered by dnwls0719, Bitcore belongs to the Paradise ransomware family. This malware is designed to encrypt data and demand payment for decryption tools/software. When Bitcore encrypts, all files are renamed with a random string of characters, the developer's email address, and the ".bitcore"

TurkStatik Ransomware
Ransomware

TurkStatik Ransomware

Discovered by cyber security researcher, Jack, TurkStatik is rogue software classified as ransomware. This malicious program is designed to encrypt data and demand ransom payments for decryption. During the encryption process, all affected files are appended with the ".ciphered" extension. For ex

Cr447.xyz Redirect
Browser Hijacker

Cr447.xyz Redirect

cr447.xyz is the address of a fake search engine, which is promoted through various potentially unwanted applications (PUAs) that are also categorized as browser hijackers. One of these apps (called APP) targets Google Chrome users. Research shows that cr447.xyz is related to QIP, another fake sea

Call Microsoft Helpline POP-UP Scam
Phishing/Scam

Call Microsoft Helpline POP-UP Scam

"Call Microsoft Helpline" is a scam run by deceptive websites. It operates by tricking users into believing that their device is infected and that they need to contact the (fake) technical support provided to resolve the issues. Note that no website can detect threats present on users' systems and

UPS Email Virus
Phishing/Scam

UPS Email Virus

"UPS Email Virus" is a spam email campaign used to proliferate a high-risk virus called Hancitor. Cyber criminals send thousands of emails encouraging users to open attached documents. In this case, the email is presented as a notification from the UPS company, however, opening the attached file l

F*CKaNDrUN Ransomware
Ransomware

F*CKaNDrUN Ransomware

Discovered by MalwareHunterTeam, F*CKaNDrUN is malicious software classified as ransomware and based on an open-source project called Hidden Tear. Victims who have computers infected with F*CKaNDrUN cannot access or use encrypted files unless they decode them with a key that can only be purchased