Step-by-Step Malware Removal Instructions

Acuf2 Ransomware
Ransomware

Acuf2 Ransomware

First discovered by Jakub Kroustek and belonging to the Dharma ransomware family, Acuf2 is a high-risk infection designed to encrypt files, thereby rendering them unusable. During encryption, Acuf2 also appends each filename with the victim's unique ID, developer's email address, and ".Acuf2" exte

Limbo Ransomware
Ransomware

Limbo Ransomware

Limbo is the name of ransomware that prevents victims from accessing their files. The cyber criminals who designed Limbo use it to blackmail people in return for a decryption tool (they demand payment of a ransom). This ransomware is a new variant of Ouroboros and was discovered by GrujaRS. Limbo

Chekyshka Ransomware
Ransomware

Chekyshka Ransomware

Chekyshka ransomware encrypts files stored on computer systems. People with computers infected with Chekyshka cannot access their data unless a decryption tool or key is purchased. Typically, the only people who can provide keys/tools are the ransomware developers. Chekyshka targets network-attach

UNNAMED Ransomware
Ransomware

UNNAMED Ransomware

Discovered by GrujaRS, UNNAMED is an updated variant of high-risk ransomware called Kraken Cryptor. The purpose of UNNAMED is to encrypt most stored files, whilst appending filenames with the victim's unique ID, developer's email address, and ".UNNAMED" extension. For example, "sample.jpg" might

Wulfric Ransomware
Ransomware

Wulfric Ransomware

First discovered by Michael Gillespie, Wulfric is a high-risk ransomware infection designed to compromise (encrypt data) so that developers are able to blackmail victims by offering paid recovery of their files. During encryption, Wulfric renames each file to a three-digit hexadecimal number and

RevengeRAT Virus
Trojan

RevengeRAT Virus

RevengeRAT (also known as Revetrat) is high-risk computer infection categorized as a remote access trojan (RAT). The purpose of this malware is to provide cyber criminals with remote access to the infected machine and allow them to manipulate it. Research shows that cyber criminals proliferate th

Bopador Ransomware
Ransomware

Bopador Ransomware

Discovered by Michael Gillespie, Bopador is high-risk ransomware from the Djvu malware family. The purpose of this infection is to encrypt stored data and make ransom demands. During encryption, Bopador appends each filename with the ".bopador" extension (for example, "1.jpg" becomes "1.jpg.bepad

Novasof Ransomware
Ransomware

Novasof Ransomware

Discovered by Michael Gillespie and belonging to the Djvu ransomware family, Novasof is a high-risk infection designed to compromise (encrypt) data and keep it that state unless a ransom is paid. Novasof renames each encrypted file by adding the ".novasof" extension (e.g.., "sample.jpg" is rename

Megac0rtx Ransomware
Ransomware

Megac0rtx Ransomware

First discovered by MalwareHunterTeam, Megac0rtx is an updated variant of high-risk ransomware called MegaCortex. After successful infiltration, Megac0rtx compromises (encrypts) most stored data and appends each filename with the ".megac0rtx" extension (hence its name). For example, "1.jpg" is re

Persephone666 Ransomware
Ransomware

Persephone666 Ransomware

Persephone666 is yet another ransomware-type infection that belongs to the Maoloa family. After infiltrating the system, Persephone666 encrypts most stored files, rendering them unusable. Additionally, Persephone666 renames each file by adding the ".Persephone666" appendix (e.g., "sample.jpg" bec