Author Archives: Max Lehmann - Page 9

Scarab-Walker Ransomware

Scarab-Walker Ransomware is a malicious application that enciphers all personal data and then demands the user to pay for its decryption. So far, it is unknown how much Bitcoins the cybercriminals who created the malware expect to receive from their victims, but knowing they could trick you, we do not advise dealing with them. It would be best if the victim would have backup copies with which he could replace all encrypted data. Otherwise, there might be nothing else to do but to wait and see if any of the volunteer computer security specialists can create a free decryption tool. Besides, it is important to mention before recovering any files or creating new data on the infected computer that it might be safest to clean the device. This is why our researchers at Anti-spyware-101.com advise removing Scarab-Walker Ransomware as soon as possible if you refuse to pay the ransom. In which case, we recommend following the steps available at the end of the article or employing a legitimate antimalware tool. For more details about the threat, you could keep reading this report. Read more »

PainLocker Ransomware

PainLocker Ransomware

PainLocker Ransomware seems to be a new version of a malicious file-encrypting program known as Everbe@airmail.cc Ransomware. It should also encipher various files located on the computer and leave a ransom note saying it is crucial to contact the cybercriminals who created this malware or the data will remain to be locked. The truth is, the files might still be lost even if you do like the hackers tell you because, in the end, no one can say what they will choose to do. Naturally, it seems to us the safest solution would be deleting PainLocker Ransomware with no hesitation. This will not bring any of your files back, but it will allow you to create new data or restore encrypted files from backup without any fear something might go wrong. If you think it would be smartest to clean your device too, you could follow the removal instructions available below this report as they will explain whole process step by step. However, users who have not decided yet what to do could read the rest of our article and learn more about this threat. Read more »

Uselessfiles Ransomware

Uselessfiles Ransomware

Uselessfiles Ransomware is not some application you could get rid of by uninstalling it via Control Panel. Unfortunately, if the malicious program manages to get in it might be not only difficult to eliminate it, but also impossible to open your photos, pictures, text or other documents, and so on. That is because the infection is programmed to encipher most valuable files to the user, which means the only unencrypted data on the computer would be the one belonging to the operating system or other applications on it. Nonetheless, the ransom note created by the threat may suggest the user could get all of his data back if he would pay a ransom. As you probably imagine, it might be unwise to trust the hackers behind Uselessfiles Ransomware as they might easily trick you by taking your money and leaving you with encrypted files. Of course, if you do not want to risk ending up being scammed you could refuse to pay the ransom and delete the malware; to do so manually follow the instructions available below. Read more »

ImpaqSpeed

ImpaqSpeed

ImpaqSpeed might seem like a useful tool for anyone who is interested in knowing his Internet speed, but our researchers at Anti-spyware-101.com advice being cautious with it as the application falls under the classification of potentially unwanted programs (PUPs). It appears to be that there are a couple of reasons why the software is thought to be untrustworthy, and if you read the rest of this report, you will find out what undesirable features may have caused this. To be more accurate, later in the text, we will talk about where ImpaqSpeed comes from, how it works and may affect the system, etc. Moreover, since our researchers advise against the PUP’s usage, there will be instructions explaining how to eliminate the questionable application manually. Instead of these steps, users can also get rid of it by performing a full system scan with a legitimate antimalware tool. Also, if you have more questions about the deletion process or the tool itself, you can leave us a message below the text. Read more »

Robin Hood And Family Ransomware

Robin Hood And Family Ransomware

Robin Hood And Family Ransomware is a malicious computer infection that tries to trick users into paying money for something it cannot deliver. In a sense, it can be even worse than your regular ransomware infections because this program does not encrypt your files – it deletes them. Therefore, in the light of such infections it is extremely important that you keep a system back-up, saving copies of your important files in an external hard drive or any other place where you can store them. We will show you how to remove Robin Hood And Family Ransomware from your system, but please note that removing this infection does not bring your files back. Read more »

OnTargetYoga Extension

There are tons of potentially unwanted programs out there on the Internet. Malware researchers at Anti-Spyware-101.com have identified yet another application of this classification, which goes by the name of OnTargetYoga Extension. If you ever come across it, be sure to refrain from it at all times. It is essential to note that this potentially unwanted program could act in an incredibly intrusive manner. It can make undesirable modifications to your browser's default settings. As a consequence of such functionality, browsing the Internet will become a much more annoying and frustrating experience, to put it lightly. Read more »

8chan Ransomware

8chan Ransomware

8chan Ransomware seems to be a new version of our previously researched malicious application called Scarab Ransomware. Our researchers at Anti-spyware-101.com say the malware acts similarly as it also encrypts user’s private data with a secure encryption algorithm and then shows a ransom note demanding to write the hackers who developed this threat via email. We are almost one hundred percent sure the reply letter should state the sum and method of paying as usually the purpose of creating infections like 8chan Ransomware is money extortion. To be more precise the hackers may suggest you pay them a ransom and promise to send decryption tools right away. However, the truth is they cannot be trusted, and as there are no reassurances they will do as they promise, we advise erasing the malware instead. It will not decipher any data, but this way users can have a fresh start with a clean system. If you keep reading our report, we will tell you more about this malicious application. Moreover, at the end of it, you should find detailed removal instructions that could help you eliminate the threat manually. Read more »

Search.search4ppl.com

Search.search4ppl.com

Whether Search.search4ppl.com has taken over the homepage, new tab page, or search provider on your web browser, you should not put up with this hijacker. Sure, it might have been attached to an extension that you found attractive, but the reality is that neither the extension nor the search tool it pushes upon you is worth your trust. As a matter of fact, Anti-Spyware-101.com malware research team strongly advises deleting this software. If you are not sure why that would be necessary, you should definitely read this report to learn all about the hijacker and the extension that is associated with it. In case anything that is mentioned in this report raises questions that are not answered, note that you can start a conversation in the comments section. Our research team has deleted Search.search4ppl.com and many of its clones, and we can give you all information you need about this malware. Read more »

Search9

If you see Search9 (search9.askthepotato.com) when you open your browser, and you are sure you have not applied these changes yourself, there is no doubt that your web browser has been hijacked. That is, its settings have been changed without your knowledge. It does not mean that there is nothing you can do about this. You can remove Search9 from your browser and then set a new page quite easily. This search tool looks legitimate, so users do not hurry to remove it from those affected browsers, but, according to researchers at anti-spyware-101.com, they should get rid of it ASAP. It is not malicious, but it cannot be called a reliable search provider too, so it would be best not to use it at all. Even though the appearance of Search9 on your browsers indicates that you have encountered a browser hijacker that has altered your preferred settings illegally, you should remove the undesirable search tool set without any problems. Continue reading to find out what you can do to make it disappear. Read more »

Magic Disk

Magic Disk

Magic Disk, also known as Mgdisk, is a potentially unwanted program. At the time of research, our Anti-Spyware-101.com malware experts could not find an official download source that would represent this strange application. That, of course, does not mean that it is not spread. It appears that this program is being distributed using software bundles, which means that it can be spread along with other potentially unwanted programs (PUPs) and even malicious infections. Do you remember specifically which programs were installed along with the suspicious one discussed in this report? Even if you do, and you are sure that they are harmless and do not need to be deleted, installing a legitimate malware scanner is an important step. Depending on the installer that is used, malware could be dropped silently, and you do not want to remain oblivious to that, do you? Whether you need to remove Magic Disk alone, or you are dealing with a bunch of threats, this article should help you. Read more »