Search and Newtab

Search and Newtab

Did you download Search and Newtab by toupdate15 thinking that it can help you browse the web more efficiently? Most likely, you do not even know where it came from, or you were tricked into letting it in when you executed a bundled downloader. The installer of this PUP (potentially unwanted program) can be found on the popular Chrome Web Store, at chrome.google.com/webstore/detail/search-and-newtab/gffphgpcblfoaknmcaldoggadmomcgmm. Although it is suggested that more than 200,000 people have downloaded this extension, and it has a 3/5* rating, the reviews written by actual users are terrible. Some of them claim: “Keeps installing itself after multiple removals, please help” or “google do somthing about this, its a virus and it keeps downloading by itself.” Clearly, this extension is doing something strange, and that is what we are here to discuss. Needless to say, we recommend removing Search and Newtab, but before you delete this PUP, we recommend that you read this report to learn all about it. Read more »

ProLock Ransomware

ProLock Ransomware

If you use remote access tools, you have to make sure that no vulnerabilities exist because ProLock Ransomware is one of the many infections that could exploit them for unauthorized access. This kind of malware cannot invade operating systems that are guarded. Unfortunately, many Windows users are pretty lax when it comes to cyber security, and that is why malware is thriving. According to Anti-Apyware-101.com researchers, PwndLocker Ransomware is the predecessor of this dangerous infection, and sadly, it is stronger as well. The old version had a bug that allowed victims to decrypt their files, and when the new variant encrypts files, they cannot be recovered manually. In fact, we do not know if they can be recovered at all. Of course, that is not what cybercriminals want you to think. They want you to think that you can purchase a decryptor from them. Instead of wasting your money, we recommend focusing on deleting ProLock Ransomware. To learn more about the infection and its removal, keep reading. Read more »

Revon Ransomware

Revon Ransomware

Revon Ransomware is a malicious application that encrypts databases, pictures, videos, various documents, and other files that could be personal or valuable. Since the malware uses a strong encryption system, files that get encrypted become unreadable. Unfortunately, if your computer cannot read your files, it cannot open them. The process could be reversed, but in order to do it you would need unique decryption tools that only the malicious application’s creators have. Victims of this malware should see a note in which the hackers ask to pay ransom and promise to deliver the needed decryption tools in exchange. If you want to learn why we do not recommend putting up with their demands as well as more information about the malware, we encourage you to read the rest on this article. If you are looking for instructions on how to delete Revon Ransomware, you should check the steps available below this text too. Read more »

Jest Ransomware

Jest Ransomware

Jest Ransomware is one of the many ransomware infections that have been terrorizing computer users worldwide. They come stealthily and then turn your entire world upside down. Jest Ransomware will also do the same: the infection will slither into your system, encrypt your files, and then it will demand that you pay a ransom to get your files back. We would like to point out that paying the ransom might not solve anything. These criminals could just collect the money and scram. Hence, you need to remove Jest Ransomware first, and then look for other ways to restore your files. Read more »

Npsk Ransomware

Npsk Ransomware

When Npsk Ransomware invades a system, it immediately encrypts files and also attaches the “.npsk” extension to their names. The infection does that to mark the files that were corrupted so that victims would not need to sift through the files to see which ones cannot be read. They cannot be read because the threat ciphers their data. This ensures that only a special private key can help read files. Unfortunately, that is a great power in the hands of cybercriminals because they can convince Windows users to pay money in return for the decryption key. Would they give the key after the payment was made? Most likely, they would not, and that is why paying the ransom that the attackers request is the worst thing you could do. In fact, contacting the attackers to pay the ransom is just as bad, and we discuss why further in the report. Obviously, if you want to remove Npsk Ransomware, we can help you with that; however, when it comes decrypting the corrupted files, we might not be able to help. Read more »

ComputerDestroyer Ransomware

ComputerDestroyer Ransomware

ComputerDestroyer Ransomware is a malicious infection that is meant to convince you that your personal files were encrypted. Well, the good news is that they were not; unless there is a real file-encryptor inside your operating system, and this fake encryptor is taking attention away from it. Of course, that is unlikely to be the case. This malicious threat is a screen-locker of sorts, and if it manages to execute inside your Windows operating system, it should first log you off and then display a full-screen window that cannot be closed normally. You should, however, be able to reboot your system to Safe Mode or Safe Mode with Networking and remove ComputerDestroyer Ransomware successfully. Hopefully, you have not been tricked into contacting the attacker behind this malware, but even if you have, and if your files were “decrypted,” you must delete this infection as soon as possible. If you want to get on with the removal right away, scroll down to the last section. If you want to learn what our Anti-Spyware-101.com research team has found, continue reading. Read more »

Damn Good Recipe Promos

Damn Good Recipe Promos

Do you want to browse recipes and also find advertisements? Most likely, you do not, but that is exactly what Damn Good Recipe Promos offers. This Google Chrome extension is meant to track your browsing activity and then provide you with relevant ads based on that. The problem is that the creator of the extension is not responsible for creating these ads. Instead, we are dealing with third-party advertisers. What is the big deal here? Well, unfortunately, we know very little about these third-party advertisers, and so it is very hard to say whether the advertisements shown by them can be trusted. This might be the main reason why Chrome users will choose to remove Damn Good Recipe Promos from their browsers. Do you want to delete this extension? If you do, we are prepared to show you the way. If you are not yet sure if that is the move you want to make, continue reading to learn more about this add-on, and then you will be able to make up your mind. Read more »

Mysupertab.com

Mysupertab.com

Mysupertab.com is one of those potentially unwanted applications that might look useful, but at the end of the day, users are recommended to remove them from their computers. This application is bound to affect only a part of web users because it is compatible with the Chrome browser. As such, we can see that this application works like a browser extension, and there isn’t anything dangerous about it. Nevertheless, if you weren’t planning on adding this extension to your browser, you might as well remove Mysupertab.com today. Scroll down to the bottom of this description for the manual removal instructions. Read more »

Rolling Search

Rolling Search

We have been seeing the term “single purpose extension” in the descriptions of many recent potentially unwanted programs, Rolling Search being one of them. This PUP belongs to the webcoapps family, along with Twisted Search, SearchZilla, Vista Search, Searchsio, and other “single purpose extensions.” What does that mean? That means that they were created for the sole purpose of providing Google Chrome users with a web search service. Unfortunately, although the creator had one job, it did not develop a search service that could aid anyone. Every single tool created by webcoapps redirects to Yahoo Search, where the results are modified to include sponsored links from third-party advertisers. This is why they are identified as PUPs and why we strongly advocate for deleting them. In this report, we focus on explaining how to delete Rolling Search, and so if that is what you are interested in, continue reading. Also, note that you can ask us questions in the comments section below. Our experienced Anti-Spyware-101.com researchers will get back to you ASAP. Read more »

Jope Ransomware

Jope Ransomware

Jope Ransomware is a threat that appends the .jope extension to files that it enciphers, for example, leaves.jpg.jope. Our researchers say that the malicious application could be after pictures, various documents, and other types of data that could be valuable to the malware’s victims. As you see, once the threat is done with encrypting files, it shows a ransom note that asks to buy decryption tools. The malware’s creators may tell you that they can guarantee that you will get what you pay for. However, such people should not be trusted as there are known cases when users paid ransom, but never heard from cybercriminals again. Therefore¸ we advise thinking carefully if you want to risk being scammed. If you do not, we advise ignoring the ransom note and erasing Jope Ransomware. To learn more about it first, we invite you to read our full article. Read more »