September, 2018  // Posts published in September, 2018

How to Delete LIGMA Ransomware (Crypto-Malware/Ransomware)

Sep 12th 2018 - by Jean-tech in: Blog PC Protection News Virus Removal | 0 Comment

What is LIGMA ransomware? And how does it carry out its attack? LIGMA ransomware is a dangerous file-encrypting malware that can cause irreversible damage to an infected computer. Based on the analysis of this crypto-malware, it does not contain any code snippet from any ransomware group. What’s interesting about it is the modules in this thread which shows that this ransomware is built aroun

Read More

How to Obliterate Pottieq Ransomware (Crypto-Malware/Ransomware)

- by Jean-tech in: Blog PC Protection News Virus Removal | 0 Comment

What is Pottieq ransomware? And how does it carry out its attack? Pottieq ransomware is a new crypto-virus discovered recently which uses the .pip suffix to in marking the files it encrypts. According to security experts, it seems that this new crypto-virus is a variant of BandarChor ransomware which was spotted way back in 2016. This new variant still targets the same files such as: .001, .

Read More

How to Terminate Forbidden Rasd Ransomware (Crypto-Malware/Ransomware)

- by Jean-tech in: Blog PC Protection News Virus Removal | 0 Comment

What is Forbidden Rasd ransomware? And how does it implement its attack? Forbidden Rasd ransomware is a data-encrypting virus designed to lock targeted data in a computer. Based on the analysis done by security experts, this new crypto-malware has uncanny similarities with VevoLocker ransomware. Once it infects a computer, it implements a series of modifications in the system. It starts by d

Read More

Wipe Out Mimicry Ransomware (Crypto-Malware/Ransomware)

Sep 11th 2018 - by Jean-tech in: Blog PC Protection News Virus Removal | 0 Comment

What is Mimicry ransomware? And how does it execute its attack? Mimicry ransomware is yet another file-encrypting virus that belongs to the HiddenTear ransomware group. It appends a .good extension to encrypted files. Researchers called this ransomware “Mimicry” as it uses fake signatures that belong to other ransomware groups such as Scarab-Horsia and Crypt0L0cker ransomware. Thus, this

Read More

Obliterate OPdailyallowance Ransomware (Crypto-Malware/Ransomware)

- by Jean-tech in: Blog PC Protection News Virus Removal | 0 Comment

What is OPdailyallowance ransomware? And how does it carry out its attack? OPdailyallowance ransomware is a new file-encrypting threat discovered by MalwareHunterTeam recently. This crypto-malware was created based on the open source platform known as HiddenTear. It uses a .CRYPTR extension in marking encrypted files. According to security experts, it appears that this new threat is a customize

Read More

Eliminating Pico Ransomware (Crypto-Malware/Ransomware)

Sep 10th 2018 - by Jean-tech in: Blog PC Protection News Virus Removal | 0 Comment

What is Pico ransomware? And how does it implement its attack? Pico ransomware is a data-encrypting virus created to lock files and demand ransom from victims. Creators of Pico ransomware asks its victims to pay $100 either in Bitcoin or Ethereum. Based on the analysis done by security experts, Pico ransom has taken the source code of Thanatos ransomware. The instant it infects a computer, i

Read More

Obliterating Cassetto Ransomware (Crypto-Malware/Ransomware)

- by Jean-tech in: Blog PC Protection News Virus Removal | 0 Comment

  What is Cassetto ransomware? And how does it execute its attack? Cassetto ransomware is yet another crypto-virus designed to encrypt data and leave them inaccessible to victims. This crypto-malware was discovered recently and does not appear to be related to any ransomware group. It begins its attack by dropping a malicious payload in the system which is used to connect the computer to a

Read More

How to Remove Searchthis.com (Browser Hijacker/PUP)

Sep 7th 2018 - by Jean-tech in: Blog PC Protection News Virus Removal | 0 Comment

What is Searchthis.com? And how does it work? Searchthis.com is a browser extension developed by APN, LLC, “a wholly business owned by IAC”. This browser extension works as a search engine with a plain user interface. In its Privacy Policy, it stated that the developers of this dubious search engine created the Privacy Policy “so that users will know what information is being collected ab

Read More

How to Delete FASTBOB Ransomware (Crypto-Malware/Ransomware)

- by Jean-tech in: Blog PC Protection News Virus Removal | 0 Comment

What is FASTBOB ransomware? And how does it carry out its attack? FASTBOB ransomware is a file-encrypting malware. Based on the analysis done by security experts, it appears that this new crypto-malware is a variant of FASTBOB ransomware. This new variant uses a .FASTBOB extension in marking its encrypted files, hence the name. The instant it starts to carry out its attack, it drops its mali

Read More

How to Wipe Out Locdoor Ransomware (Crypto-Malware/Ransomware)

Sep 5th 2018 - by Jean-tech in: Blog PC Protection News Virus Removal | 0 Comment

What is Locdoor ransomware? And how does it implement its attack? Locdoor ransomware is a crypto-malware that’s still under its development phase so it isn’t clear yet if it can actually encrypt files in a computer. Locdoor ransomware also goes by the name DryCry ransomware. Once it infects a computer, it will drop its malicious payload in the system and implement a series of commands in th

Read More

1234