Author Archives: Lisa Blanc - Page 115

Hermes Ransomware

Hermes Ransomware

As you can probably tell from the name, Hermes Ransomware is a ransomware application. Worse, this program is an encrypting ransomware infection. It means that it holds your system hostage once it encrypts a number of your files, thus making them inaccessible. To get your files back, you are expected to pay a designated sum of money. However, before you do anything of the sort, you should remove Hermes Ransomware from your system. It is never a good idea to give your money away to these criminals. Do what is best to you and your computer by terminating all the malicious threats right now. Read more »

024-7718-0138 Support

Our malware analysts at Anti-spyware-101.com have recently received information about a fake pop-up error message that has since been dubbed 024-7718-0138 Support. Apparently, it was developed by cybercriminals that want to extract money from you, and they use this message to trick you. You should remove the software that was configured to render the fake error. However, before you do that, we invite you to read this whole article as it contains a lot of useful information. Read more »

All_Your_Documents.rar Ransomware

All_Your_Documents.rar Ransomware

All_Your_Documents.rar Ransomware is a rather unusual infection compared to other malicious programs created for money extortion. Apparently, instead of encrypting all user’s files separately, it places them into a password-protected folder. Thus, the malware’s victims are asked to pay a ransom not in exchange of a decryption key, but of a unique password. If you came across this ransomware yourself, you should not make any rash decisions. Transferring the ransom does not guarantee the user will receive the password to unlock his data. This is why we advise users save their money and look for other ways to get back the files that might have been lost. If you want to learn more information about All_Your_Documents.rar Ransomware we urge you to keep reading our report and should you decide to erase the threat know that there are removal instructions below the article. Read more »

Serpent Ransomware

Serpent Ransomware

If your operating system has been infected with Serpent Ransomware, your personal files must have been encrypted already. This infection does not waste time, and the moment it is executed, the encryption process begins. The distribution of this ransomware is not surprising because it is spread exactly like CryptoKill Ransomware, Pabluk Locker Ransomware, and many other threats alike that we have reported before. It all comes back to spam emails. Your email address could have been extracted a long time ago using one of the many scams, such as fake prize giveaways or surveys. Once the distributor of the ransomware has a list of emails, it initiates a mass spam email attack where different email addresses are sent the same misleading message with the launcher attached to it. By the looks of it, it appears that the main target of this particular threat are users in Denmark, as they are sent the same corrupted spam email with the subject line “Sidste påmindelse for udestående faktura [number].” If you have opened it, as well as the document attached to it, it is most likely that you now need to remove Serpent ransomware. Read more »

Motious.com

Motious.com

Motious.com may show up as your new home page in your Google Chrome, Internet Explorer, and Mozilla Firefox browsers after a bunch of malware infections infiltrate your system. The appearance of this search page is due to a browser hijacker that may put your virtual security at risk with the content it may introduce you to. Apart from potentially altered search results, this hijacker also presents to you questionable third-party advertisements on its main page. Although this search page is different from most of its peers as it provides you with additional content, such as hardware reviews. But why would you leave such a risky search page in your browsers? If you want to use a secure computer, you cannot have the luxury of even potentially unwanted programs on board. Therefore, our malware specialists at anti-spyware-101.com suggest that you remove Motious.com from your browsers as soon as possible. But before you jump to the end of this article to do so, let us tell you more about this infection and its potential risks. Read more »

Please call us immediately at: (803) 702-1564

Please call us immediately at: (803) 702-1564

Please call us immediately at: (803) 702-1564 warning is nothing more than another fake alert created to scam inexperienced users. This is why, you should not believe when it says the system detected spyware, viruses, or other malicious applications and the only way to protect the computer is to call the provided telephone number. Since the warning is false, there is a chance the scammers behind it could try to convince the user to reveal his computer password or get some other sensitive information. Therefore, it is most advisable to avoid calling the scammers. Instead, you should close Please call us immediately at: (803) 702-1564 window and find the application that could be responsible for its appearance on the browser. To make this task easier, we will explain more about the threat in the text. Also, we will place removal instructions for manual deletion just below the article. Read more »

Myfast-search.com

Myfast-search.com

According to our cyber security experts, Myfast-search.com is a malicious search engine because its developers have made the conscious decision to distribute it in such a manner that enables it to replace your browser’s homepage address without your knowledge or approval. You might want to remove this undesirable search engine from your browser because of this fact and because it can collect information about you and show you modified, ad-supported search results that can have links to malicious websites. In short, this search engine is a potential threat, but if you want to know more about it in greater detail, then we suggest reading this whole article. Read more »

CryptoKill Ransomware

CryptoKill Ransomware

CryptoKill Ransomware is a poorly made copy of Hidden-Tear, a ransomware-type program that was designed to encrypt your personal files and demand money for the decryption key. However, this new ransomware does not ask you to pay a ransom. It just encrypts your files and offers no method, no opportunity for you to get them back. It seems that it is a test version which would explain why it is missing this essential feature. Removing this malicious application is highly recommended because of this fact. For more information, please read this whole article. Read more »

0800-014-8604 Pop-Up

0800-014-8604 Pop-Up is an annoying malware infection that has been categorized as a fake alert by our malware specialists at anti-spyware-101.com. It seems that the related malicious webpage has been shut down temporarily; it is not available right now. Still, you may have been infected with malware that redirects you to this page. We have seen several very similar infections in the past year, including “Fake Microsoft Office Activation Tech Support,” “Fake Windows Defender Prevented Malicious Software Tech Support,” and “License has Expired +1-888-303-5121.” Our experts say that all these fake alerts are indeed technical support scams that try to corner inexperienced computer users and make them call a provided phone number as a seemingly last resort. However, you will definitely not talk to Microsoft certified technicians eagerly helping you to give you support. Unfortunately, these schemers only want your money and possibly your personally identifiable information that could be sold, for example, to criminals on the dark web. We recommend that you remove 0800-014-8604 Pop-Up as soon as possible. Read more »

Cryptconsole Ransomware

Cryptconsole Ransomware

According to our researchers, Cryptconsole Ransomware is a highly malicious application that can encrypt your personal files and render them useless. Therefore, removing it is highly recommended, but if your PC has already been infected with it, then it is likely that your files have already been encrypted. Interestingly, this ransomware does not drop a ransom note, so there is no telling whether its developers (who are nothing short of cyber criminals) want you to pay them for a decryption key. Read more »