Virus and Spyware Removal Guides, uninstall instructions

Zippyshare.com Suspicious Website

What is zippyshare[.]com?

Zippyshare[.]com is a file-sharing website. While this service is legitimate, the site uses rogue advertising networks. Hence, visitors to this website can be presented with misleading/harmful ads and/or get redirected to untrustworthy/malicious webpages through them.

Employing advertising networks of this kind is a common monetization technique. Therefore, the Internet is rife with such pages; yifymovies.pro, 320ytmp3.com, mp3convert.cc, 1337x.to, and lookmovie.io are but a few examples.

   
FlawedGrace Malware

What is FlawedGrace?

FlawedGrace is a piece of malicious software classified as a RAT (Remote Access Trojan). Malware of this type is designed to enable remote access and control over infected devices. It is noteworthy that FlawedGrace has been actively proliferated via email spam campaigns.

   
Fugles.net Ads

What is fugles[.]net?

Fugles[.]net is a rogue website that loads dubious content and/or redirects its visitors to other (likely unreliable or malicious) pages. The Internet is rife with such websites; news-lipaze.ccpositivestar.orgnews-gemara.cc, and totaltopposts.com are but a few examples.

Most users are redirected to rogue webpages by suspect sites, intrusive advertisements, or installed PUAs (Potentially Unwanted Applications).

   
ForceGuide Adware (Mac)

What is ForceGuide adware?

ForceGuide generates annoying ads and changes web browser's settings (promotes a fake search engine). This app has the qualities of adware and a browser hijacker. It is very uncommon for apps of this type to downloaded and installed knowingly. Thus, ForceGuide and similar apps are categorized as potentially unwanted applications (PUAs).

   
CTT Email Scam

What is "CTT" email scam?

"CTT email scam" refers to a spam campaign. The emails sent through it are disguised as failed delivery notifications from CTT - Correios de Portugal, S.A. – the Portuguese national postal service and commercial group dealing in banking and e-commerce.

It must be emphasized that these letters are fake and in no way associated with the real CTT. This spam mail aims to promote a phishing website designed to record vulnerable data entered into it.

   
DeployService Adware (Mac)

What is DeployService adware?

DeployService is the name of an application that has two purposes: to display advertisements and hijack web browsers. It hijacks browsers to promote a fake search engine. Most users download and install adware/browser hijackers inadvertently. For this reason, DeployService falls into the category of potentially unwanted applications (PUAs).

   
IndexSearch Adware (Mac)

What is IndexSearch?

IndexSearch is an adware-type application with browser hijacker traits. Since most users inadvertently download/install such apps, they are also categorized as PUAs (Potentially Unwanted Applications).

   
HistCleaner Browser Hijacker

What is HistCleaner browser hijacker?

HistCleaner changes some of the web browser's settings to histclean.com - it hijacks a browser to promote a fake search engine. Users rarely download and install browser hijackers knowingly. For this reason, HistCleaner and similar apps are categorized as potentially unwanted applications (PUAs).

   
2hgxp Ransomware

What is 2hgxp ransomware?

2hgxp is a ransomware-type program. It operates by encrypting data (locking the files) and demanding payment for the decryption.

Encrypted files are appended with a random character string and a ".2hgxp" extension. For example, a file initially titled "1.jpg" would appear similar to "1.jpg.2hqnFi72JiEPnnfG5pz9bnUtS-e-RxwsVk7TZ-Uk6t3_Y12sx9opPbk0.2hgxp". Afterwards, a ransom note - "NKoP_HOW_TO_DECRYPT.txt" - is created.

   
50 Hours To Make The Payment Ransomware

What is 50 Hours To Make The Payment ransomware?

50 Hours To Make The Payment ransomware is part of the Xorist family. It encrypts files, appends ".remember_you_have_only_50_hours_to_make_the_payment_or_we_will_delete_your_decryptor_from_our_base" as their new file extension.

For example, it renames "1.jpg" to "1.jpg..remember_you_have_only_50_hours_to_make_the_payment_or_we_will_delete_your_decryptor_from_our_base".It also creates the "HOW TO DECRYPT FILES.txt" file as its ransom note.

   

Page 965 of 2353

<< Start < Prev 961 962 963 964 965 966 967 968 969 970 Next > End >>
About PCrisk

PCrisk is a cyber security portal, informing Internet users about the latest digital threats. Our content is provided by security experts and professional malware researchers. Read more about us.

Malware activity

Global malware activity level today:

Medium threat activity

Increased attack rate of infections detected within the last 24 hours.

Virus and malware removal

This page provides information on how to avoid infections by malware or viruses and is useful if your system suffers from common spyware and malware attacks.

Learn about malware removal