SpyHunter

Malware Remediation Utility

  • Detect & remove the latest malware threats.
  • Malware detection & removal definitions are updated regularly.
  • Technical support & custom fixes for hard-to-kill malware.
* Free Remover allows you, subject to a 48-hour waiting period, one remediation and removal for results found. Read our EULA, Privacy Policy & Special Discount Terms. See more Free SpyHunter Remover details.

Top Security News

Cybercriminals Are Still Taking Advantage of COVID-19 with Increased Attacks Microsoft unveiled its Asia Pacific findings from its latest Security Endpoint Threat Report for 2019, which shared that cybercriminals are making 60,000 COVID-19 themed phishing attempts daily....
Cybercriminals Sticking to Coronavirus and Financial Themes for Phishing Scams Summer is at its peak, and the online scammers are still doing whatever they can to take advantage of the uncertainty caused by the pandemic. Cyber-attacks are targeting businesses and consumers in...
Agencies Warn of Imminent Ransomware Cybercrime Threat to US Healthcare Sector Several agencies came out with a joint advisory on October 28 with stern warnings to the healthcare sector related to cybercrime. The advisory concerns an "imminent and increased cybercrime threat...

Top Articles

WebDiscover Browser

WebDiscover Browser screenshot

WebDiscover Browser is an adware threat developed by a Canada-based company named WebDiscover Media. Once installed on a PC, the malicious app makes a series of unwanted changes to all browsers installed on the computer, leading to a deteriorating online surfing experience. WebDiscover replaces the default home pages and search engines of affected Internet browsers with its own WebDiscover Homepage and WebDiscover Search, respectively. Furthermore, the malicious app modifies the “new tab” settings so that the corrupted browsers launch the malware's own search portal page when the user opens a new tab. Chrome users may not even recognize WebDiscover as an unwanted program and think they...

Posted on July 3, 2015 in Browser Hijackers

STOP Ransomware

STOP Ransomware screenshot

PC security researchers received reports of ransomware attacks involving a threat known as the STOP Ransomware on February 21, 2018. The STOP Ransomware is based on an open source ransomware platform and carries out a typical version of an encryption ransomware attack. The STOP Ransomware is distributed using spam email messages containing corrupted file attachments. These file attachments take the form of DOCX files with embedded macro scripts that download and install the STOP Ransomware onto the victim's computer. Learning how to recognize phishing emails and avoiding to download any unsolicited file attachments received is one of the ways to avoid these attacks. How to Recognize a...

Posted on February 26, 2018 in Ransomware

How to Fix Mac Error Code 43 When Copying Files

How to Fix Mac Error Code 43 When Copying Files screenshot

Getting an OS system error message while working on a project can be quite an unpleasant surprise. Whether relating to MS Windows, or Mac OS, such a bug is always bound to disrupt your normal computer work. While some errors tend to be system-specific, others can affect both Windows and Mac-based systems, albeit designating totally different problems. The so-called Code 43 error message, for example, is primarily associated with device driver problems in Windows PCs, on the one hand, and file transfer issues on Mac machines, on the other. If you are using Windows and looking for a way to fix this specific error, click here for a guide with possible solutions. If you are a Mac user,...

Posted on January 30, 2019 in Computer Security

Newsbreak.com

Newsbreak.com screenshot

At first glance, the Newsbreak.com website appears to be a useful tool that would provide its visitors with the latest news. However, this is one of the countless bogus websites online that do not provide any content of value, and instead, seek to benefit from their visitors using various shady tricks. Spams Users with a Constant Flow of Advertisements Upon visiting the Newsbreak.com page, users will be asked to permit the site to display Web browser notifications. Keeping in mind that this fake page poses as a legitimate news website, many users may be tricked to allow browser notifications thinking that they will be alerted for the latest breaking news. However, this is not the case,...

Posted on February 3, 2020 in Browser Hijackers

APT Attack Spreads Malware Using Coronavirus Theme

APT Attack Spreads Malware Using Coronavirus Theme screenshot

The APT (Advanced Persistent Threat) group was spotted sending out spear-phishing emails that allegedly have detailed information about COVID-19, a.k.a. Coronavirus, but instead, they infect the victims with a custom remote access Trojan (RAT). The group is using the coronavirus pandemic to infect unsuspecting victims with a previously unseen malware. The malware is dubbed 'Vicious Panda' by researchers, with the attackers using it in a campaign at the moment. Researchers managed to find two Rich Text Format (RTF) files that were targeting the Mongolian public sector during the outbreak. Once the files are open, a unique and custom-made remote access Trojan is executed. It develops a list...

Posted on March 16, 2020 in Computer Security

.HOW Ransomware

.HOW Ransomware screenshot

.HOW Ransomware is a new file-encrypting Trojan, which appears to belong to the notorious Dharma Ransomware family. Data-lockers like the .HOW Ransomware are not built from scratch. Instead, their creators borrow the code of well-established threats like the Dharma Ransomware and create a new copy of it with a different name.  Propagation and Encryption To cause a significant amount of damage to the compromised host, the .HOW Ransomware is likely to go after a wide array of filetypes, such as .doc, .docx, .pdf, .txt, .mp3, .midi, .mid, .aac, .wav, .mov, .webm, .mp4, .db, .zip, .rar, .jpg, .jpeg, .png, .svg, .gif, .xls, .xlsx, .ppt, .pptx and others. The .HOW Ransomware uses a complex...

Posted on June 29, 2020 in Ransomware

Google Redirect Virus

Google Redirect Virus screenshot

The Google Redirect Virus has been around for quite some time and is known by many aliases, although, the primary behavior remains constant. Basically, the Google Redirect Virus plays tricks on the minds of PC users who desire Google web searches by randomly redirecting them to malicious web pages or search engines. The Google Redirect Virus Makes Online Searches Ineffective and Dangerous The Google Redirect Virus (GRV) has been frustrating Internet users for several years now, yet it looks like there is still no effective method for avoiding the infection. In fact, it has even become one of the most severe cybersecurity issues of our time due to the vast popularity of the Google search...

Posted on May 14, 2009 in Viruses

Search Marquis

Search Marquis screenshot

Search Marquis is a browser component that may disguise itself as a helpful tool that will enhance the browsing quality of popular browsers like Chrome and Safari. In fact, it is a shady browser extension that aims to alter the browser's setting without the user’s knowledge and consent. The main purpose of this Potentially Unwanted Program (PUP) is to sneak stealthily into Mac computers and generate revenue for its operators. This happens through a number of intermediate redirects through various dubious domains before displaying Bing.com results. This Week In Malware Episode 36 Part 2: Why Your Web Browser is Redirecting to Search Marquis & and How to Stop It! Once installed on a Mac...

Posted on June 9, 2020 in Browser Hijackers, Mac Malware

Fuq.com

The Fuq.com virus is an adware-type of program that promotes websites with pornographic content. The advertising campaigns of this Potentially Unwanted Program (PUP) are very aggressive. They force their victims to view the suspicious content of the promoted pages by displaying relevant advertisements, banners or videos on the infected devices. The Fuq.com virus falls under the Mac viruses category and may cause many cybersecurity issues because of the content it pushes – pornographic websites often lead users to other unsafe websites, trigger malware downloads, or trick users into installing potentially harmful applications and tools. This Mac virus can be found on all popular browsers, including Firefox, Chrome, Safari, and Edge, whereby some typical symptoms will indicate its presence. The Fuq.com virus modifies the browser's...

Posted on January 6, 2021 in Mac Malware

More Articles

Fix Bluetooth Problems on Windows

Nowadays, a myriad of devices uses Bluetooth to establish communication and connect to other devices. Indeed, the convenience that this technology has brought to our daily lives cannot be understated but having to deal with a device that refuses to connect simultaneously is a frustrating situation that almost everyone has had to handle at some point. If you are experiencing Bluetooth issues on a computer using Windows, there are several easy methods that could address a variety of potential causes. A good first option is to run the Bluetooth troubleshooter that comes with Windows 10. To start, type troubleshooting into the taskbar's Search field; the top result should be 'Troubleshoot settings,' so click on it. In the window that appears, you should scroll down until you reach 'Additional troubleshooters' and click on it. From the...

Posted on January 15, 2021 in Issue

Daisybuleonclock.com

Daisybuleonclock.com is a mostly empty website, but don't let that fool you - the website exists for the sole purpose of carrying out a popular browser scam. It tries to fool its visitors into clicking the 'Allow' button by employing deceptive social-engineering tactics. Daisybuleonclock.com is in no way unique; in fact, the opposite is true. There are countless websites virtually identical to each other that are all propagating the same type of scam, and more websites are popping into existence every single day. By far, the most popular scenario is for the scam website to pretend to be performing a captcha bot check. Daisybuleonclock.com, however, has chosen a different approach, trying to take advantage of the curiosity of its visitors. Anyone who lands on the site will be presented with a video window that appears to be currently...

Posted on January 15, 2021 in Browser Hijackers

Fast2captcha.com

Fast2captcha.com is a deceptive website that exists for a singular purpose - to try and trick PC users into subscribing to its push notification services by clicking the 'Allow' button. This particular scam has been perpetuated through a myriad of virtually identical websites, with more and more being put on the net each day. Fast2captcha.com is not an exception. Any visitor who lands on the website will be presented with several fake or misleading messages, alerts, or error messages. The main trick employed by Fast2captcha.com and by far the most widespread one among this type of scam websites is to pretend to be conducting a captcha check for bots. Prominently displayed on the site will be an animated robot with a through bubble stating the following: 'CLICK ALLOW TO CONFIRM YOU ARE NOT A ROBOT!' If the visitor follows the...

Posted on January 15, 2021 in Mac Malware

M88P Ransomware

The M88P Ransomware is capable of causing significant damage to any computer it manages to infiltrate successfully. By deploying an encryption routine using a combination of cryptographic algorithms, the files affected by the M88P Ransomware are virtually unrestorable without the specific decryption key possessed by the hackers. The M88P Ransomware is a new threatening variant belonging to the Matrix Ransomware family that has been identified in the wild by infosec researchers. One of the first signs of the M88P Ransomware's destructive behavior is most likely going to be the sudden change in the names of all files affected by the threat. Indeed, each encrypted file will have its original name modified drastically following a complex pattern. M88P takes the original name and attaches to it an email address belonging to the hackers, a...

Posted on January 15, 2021 in Ransomware

TeslaRVNG1.5 Ransomware

The TeslaRVNG1.5 Ransomware is a potent threat that can wreak havoc on any computer it manages to infiltrate. The encryption processes that leverages an uncrackable cryptographic algorithm ensures that the files affected by the threat will be virtually impossible to restore without the specific decryption code. Analysis of the TeslaRVNG1.5 Ransomware revealed a variant belonging to the already established Ouroboros Ransomware family. The pattern used by TeslaRVGN1.5 Ransomware for the names of the files it encrypts is rather complex. The threat attaches to the front of the file's original name a string of characters representing the unique ID assigned to the victim, followed by an email address under the control of the hackers. The particular email is 'tesla369@cock.li.' In addition, a new file extension - '.teslarvgn1.5' will be...

Posted on January 15, 2021 in Ransomware

Nedexam.top

Nedexam.top is a browser-based tactic that aims to make users subscribe to its push notifications. Once this is achieved, this rogue website starts delivering unwanted and potentially harmful advertisements, banners, and pop-ups direct to the target device. Visitors of this website see a blank screen on which the following misleading message is displayed: 'Nedexam.top wants to Show notifications Click Allow to confirm that you are not a robot!' Users who click on the 'Allow' button unknowingly give Nedexam.top permission to send them browser notifications. Messages from this website usually advertise websites with adult content, such that offer fake/cracked software copies, online gaming websites, and many other potentially unsafe products and services on the Internet. If you see Nedexam.top advertisements on your screen, you probably...

Posted on January 15, 2021 in Browser Hijackers

Pointcaptchaspot.com

Pointcaptchaspot.com is a potentially unsafe website that wants to trick visitors into subscribing to its browser notifications. This page starts sending countless advertising pop-ups and other third-party content straight to the users' phones or computers in case of a successful subscription. Pointcaptchaspot.com displays a fake CAPTCHA-human verification test saying: 'Pointcaptchaspot.com wants to Show notifications Click Allow to confirm that you are not a robot!' If the users fall into that trap and click on the 'Allow' button, they give the compromised page permission to deliver advertising material to their devices, even when no browser is launched. The spam pop-ups advertise online games, websites with adult content, various Potential Unwanted Programs (PUPs), fake software updates and other questionable content. Pages offering...

Posted on January 15, 2021 in Browser Hijackers

ActivePower

ActivePower is a potentially malignant piece of software installed as a browser extension or a stand-alone program on target computers. ActivePower is similar to a browser hijacker, and its primary function is to redirect online traffic through a particular rogue search engine and generate advertising revenues for its operators. As soon as ActivePower manages to sneak into a computer, it replaces the browser's default search engine and homepage with the ActivePower Search – a bogus search engine. Consequently, the compromised browser opens this potentially unsafe URL each time the user tries to surf the Internet. Also, all search queries get redirected through the malware's fake search tool, while a results page from a legit search engine is displayed. ActivePower falls under the Potentially Unwanted Programs (PUP) category due to its...

Posted on January 14, 2021 in Potentially Unwanted Programs

OptimalUnit

OptimalUnit is a Potentially Unwanted Program (PUP) that malware researchers classify as a browser hijacker. These PUPs are designed to promote fake search engines, redirect users to unknown websites, and generate advertising revenues for their operators. In the particular case of OptimalUnit, the questionable search provider that is supposed to be pushed is found at directsearchapp.com. To fulfill its purpose, this malware threat undertakes specific unsolicited modifications of the infected browser's settings. OptimalUnit replaces the original homepage, default search engine, and new tab address with the OptimalUnit Search. As a result, each time the users launch their browser, they get redirected to this potentially harmful URL, while the same unreliable search engine conducts all user search queries. OptimalUnit does not have the...

Posted on January 14, 2021 in Potentially Unwanted Programs

External Drive Does Not Show Up on Computer

Although taking one's data storage outside of a defined space like a case makes logistical sense, it also might introduce issues that users aren't ready to see. Whether it's due to software or hardware errors, not seeing a hard drive that's supposed to be visible can become a stressful problem for backup solutions and file access. Experts offer a range of readily on-hand solutions for users who want to solve this issue themselves. When installing a new external drive, always read the requirements carefully. These products should include a specified range of supported operating systems, such as macOS or Windows 7 and 10. For network-attached storage or NAS drives, there also are additional wireless connectivity requirements. Most PCs will come with built-in ethernet or LAN support, for example, although some slim models of...

Posted on January 14, 2021 in Issue

Wireless Devices Not Working on Windows

While most wireless products operate on a plug-and-play or PnP philosophy that 'just works,' the variations in Windows architecture can be considerable. Unexpected compatibility problems can cause errors between a wireless device and its receiver or even make the device nonfunctional. In that situation, Windows users should troubleshoot some of the most common problems that arise in wireless technology quickly and solve them instead of replacing a possibly-working mouse, keyboard, or headset. Outdated driver software is a common source of conflicts. Users can check the driver version of their wireless device from the Device Manager, navigating to the appropriate sub-menu (such as 'Mice and other pointing devices'), right-clicking and choosing Properties and looking at the Driver tab. To update a driver to a new version, navigate to the...

Posted on January 14, 2021 in Issue

FBI Screenlocker

The FBI Screenlocker, as its name suggests, belongs to the screen locker type of malware. While the end goal is the same as that of ransomware threats, screen lockers are not as threatening and comparatively more comfortable to deal with because they do not encrypt any files on the compromised computer. Instead, they block the user's access through a full-screen window that usually contains a variant of a popular tactic scenario. The FBI Screenlocker follows a pattern - it blocks the system with a fullscreen window containing an alarming and completely fake message that asserts that the FBI has detected illicit activities being performed on the particular computer. It tries to paint the user as a hardened criminal who has now been caught doing some rather heinous crimes. The lists displayed by the FBI Screenlocker consists of four...

Posted on January 14, 2021 in Ransomware

Astercom.top

Astercom.top is a deceptive website with a singular purpose - to trick visitors into subscribing to its push notification services. Those who fail to notice the trap and click the 'Allow' button as implied by the website conveniently will soon start to receive unwanted advertisements on the screen of their devices directly. Astercom.top is in no way unique apart from its name as there are countless virtually identical websites dedicated to propagating the same browser tactic. The most popular tactic, and one that Astercom.top also uses, is to pretend that a captcha check for bots is being carried out. The main message displayed across the website prominently states: 'Click Allow to confirm that you are not a robot!' To up its chances for success, Astercom.top also generates several fake alerts or error messages. Possible variations...

Posted on January 14, 2021 in Browser Hijackers

SearchConverterInc Search

No matter what unique features SearchConverterInc Search may boast to have, the truth that users who install the application will realize is that it is nothing more than a browser hijacker immediately. The application's primary goal is to take over the user's Web browser and force it to open a promoted address. The settings that nearly all browser hijackers target are the homepage, new page tab, and the default search engine. SearchConverterInc Search modifies these settings to open the feed.searchconverterinc.com address, which is a fake search engine. As a result, whenever the user simply starts the affected browser, opens a new page tab, or conducts a search, it would generate artificial traffic towards the promoted address. As for feed.searchconverterinc.com, it is classified as a fake search engine due to its complete inability to...

Posted on January 14, 2021 in Potentially Unwanted Programs

Bonsoir Ransomware

The Bonsoir Ransomware is a file-locking Trojan that's not part of a known family or Ransomware-as-a-Service. It endangers' users access to their media files, such as documents, by encrypting them and demands a ransom through a TOR website for decrypting them. Adequate backup precautions may nullify most infection effects and well-maintained security products should remove the Bonsoir Ransomware on sight. A Not-Too-Good Evening Encountering Trojans An independent file-locker Trojan that thinks it has the chops to compete with enormous Ransomware-as-a-Service families appears out in the wild, with victims submitting samples as of early January. The Bonsoir Ransomware has many of the behavioral norms and infrastructure setup that malware experts link to well-maintained RaaS businesses. It just goes to show that polish is an appreciable...

Posted on January 14, 2021 in Ransomware
1 2 3 4 5 6 7 8 9 ... 1555