Virus and Spyware Removal Guides, uninstall instructions

MacBar Adware (Mac)

What is MacBar?

MacBar is a deceptive application that supposedly improves the web browsing experience by allowing users to search the Internet directly from the desktop - "We all use the web for our personal and professional lives, but clutter and distractions slow us down. MacBar solves this problem by letting you browse and search straight from your desktop - with one click of the mouse." 

This PUP specifically targets MacOS. On initial inspection, MacBar may seem legitimate and useful software, however, due to rogue behavior (stealth installation and tracking of users' web browsing activity), MacBar is classed as a potentially unwanted program (PUP).

   
Wow.com Redirect

What is wow.com?

According to the developers, the wow.com website provides users with quick access to various popular social networks, online stores, etc. For example, eBay, Facebook, and Twitter. This site is a part of AOL and is promoted as a 'bundle' with regular software.

After installation, wow.com modifies web browser (Internet Explorer, Google Chrome, and Mozilla Firefox) settings without users' permission. For this reason, it is categorized as a potentially unwanted program (PUP).

   
Green_Ray Ransomware

What is Green_Ray?

Green_Ray is ransomware identical to Mahasaraswati and JohnyCryptor. This ransomware encrypts files using an asymmetric encryption algorithm, generating public (to encrypt) and private (to decrypt) keys during encryption.

In addition, Green_Ray extends the name of each compromised file with "green_ray(@)aol.com.xtbl", thus making it straightforward to determine which files are encrypted.

   
Black Shades Ransomware

What is Black Shades (BlackShades Crypter)?

Black Shades is a ransomware-type virus that encrypts files using the RSA-4096 encryption algorithm. This is an asymmetric encryption type and, therefore, public (to encrypt) and private (to decrypt) keys are generated during encryption. The private key is stored on remote servers controlled by cyber criminals.

To receive this key and restore the files, victims must pay a ransom. Furthermore, Block Shades appends the name of each encrypted file with a .silent extension.

   
Searchinterneat-a.akamaihd.net Redirect

What is searchinterneat-a.akamaihd.net?

According to the developers, the searchinterneat-a.akamaihd.net website improves Internet searching by generating the most relevant search results.

Initially, this site may seem legitimate and useful, however, be aware that searchinterneat-a.akamaihd.net is promoted using deceptive software installers that modify web browser settings without users' permission. Once the system is successfully infiltrated, Internet browsing activity is continually tracked.

   
Search.bakinu.com Redirect

What is Bakinu?

Bakinu is a deceptive application that supposedly allows users to search the Internet and use the functionality of various websites directly from their desktops. This functionality may seem legitimate and useful, however, this application causes unwanted browser redirects and tracks Internet browsing activity. For these reasons, Bakinu is classed as a potentially unwanted program (PUP) and adware.

   
eTogether Browser Hijacker

What is eTogether?

eTogether is a deceptive app claiming to provide a dating service - "eTogether is one of the Top Dating Service providers. Thousands of successfully matched numbers throughout the world are a proof of this and each year millions of new members are taking advantage of the dating opportunities that eTogether has to offer!" 

These claims often trick users to install, however, eTogether hijacks Internet browsers and stealthily modifies their settings. In addition, eTogether continually monitors users' web browsing activity. For these reasons, it is classed as a browser hijacker and a potentially unwanted program (PUP).

   
Search.greatsocialsearch.com Redirect

What is search.greatsocialsearch.com?

search.greatsocialsearch.com is a fake Internet search engine claiming to significantly improve the web browsing experience by generating the most relevant search results. Judging on appearance, this site is very similar to legitimate search engines such as Google, Bing, and Yahoo.

For this reason, many users believe that search.greatsocialsearch.com is also legitimate. In fact, developers promote this bogus site using dubious software 'installers' that modify web browser settings without users' permission. In addition, this site continually gathers information regarding users' web browsing activity.

   
zCrypt Ransomware

What is zCrypt?

zCrypt is ransomware that uses the asymmetric encryption algorithm to encrypt files stored on the infiltrated computer (adding the .zcrypt extension to encrypted files). It is distributed using malicious email attachments. During encryption, zCrypt generates two keys - public and private.

While the public key is used to encrypt files, the private one is used to decrypt. Since the private key is stored on remote servers controlled by cyber criminals (developers of zCrypt), victims must pay a ransom in exchange for this key.

   
Search.bestmediatabsearch.com Redirect

What is search.bestmediatabsearch.com?

Search.bestmediatabsearch.com is a fake Internet search engine identical to newtabtvplussearch.com, newtabtvgamasearch.com, and a number of other dubious sites. The appearance of this website is also very similar to Google, Bing, and Yahoo.

Therefore, many users believe that search.bestmediatabsearch.com is also a legitimate website. This site, however, is promoted using dubious software 'installers' that are designed to hijack web browsers and modify their settings. In addition, search.bestmediatabsearch.com continually gathers various user/system information.

   

Page 1972 of 2254

<< Start < Prev 1971 1972 1973 1974 1975 1976 1977 1978 1979 1980 Next > End >>
About PCrisk

PCrisk is a cyber security portal, informing Internet users about the latest digital threats. Our content is provided by security experts and professional malware researchers. Read more about us.

Malware activity

Global malware activity level today:

Medium threat activity

Increased attack rate of infections detected within the last 24 hours.

Virus and malware removal

This page provides information on how to avoid infections by malware or viruses and is useful if your system suffers from common spyware and malware attacks.

Learn about malware removal