Malware

Remove “Your Netflix Subscription Is Expiring Soon” scam email

“Your Netflix Subscription Is Expiring Soon” is a phishing email that aims to phish your Netflix login credentials so your account can be sold to users looking for cheap streaming service subscriptions. The email claims that your account has been terminated because of an issue with your payment. It asks that you update your payment details to reactivate your account.…

How to remove Arma dei Carabinieri virus

Arma dei Carabinieri virus is a screen locker infection that falsely claims you watched/distributed highly illegal content and need to pay a €100 fine to avoid being prosecuted. The virus infection locks the screen and displays a message in Italian, supposedly from Italian authorities Arma dei Carabinieri. The message on the screen is completely fake and users can ignore the contents.…

How to remove Miia ransomware

Miia ransomware is file-encrypting malware. This malware comes from the Djvu/STOP ransomware family and can be identified by the .miia extension added to encrypted file names. The malware targets personal files, encrypts them, and demands payment for their recovery. A free Miia ransomware decryptor is currently not available, and only users with backups can recover files for free at the moment.

What is the “Mailbox Abuse Notice” email

“Mailbox Abuse Notice” email is part of a phishing campaign that tries to steal users’ email login credentials. The email falsely claims that your email provider noticed an unusual login from an unrecognized device and advises that you review your recent activities. If you interact with the email and click on the link, your email login credentials may be phished…

What is the “Roundcube Password Set To Expire” email

“Roundcube Password Set To Expire” email falls into the phishing email category. The email falsely claims that users’ passwords are about to expire, and users need to click on the link to keep the same password. Failure to engage with the email will supposedly lead to the accounts being blocked. If users click on the link, they will be asked…

What is the “I’ve Got Access To Your Smartphone” email

“I’ve Got Access To Your Smartphone” email falls into the sextortion scam email category. It’s a very generic sextortion email that falsely claims a video of the recipient watching pornography has been made and will be distributed to all contacts unless a payment of $1,000 is made to the sender. The email contents are completely false, and users can just…

How to remove Hlas ransomware

Hlas ransomware is file-encrypting malware. It belongs to the Djvu/STOP ransomware family. This version can be identified by the .hlas extension added to encrypted file names. Unfortunately, once files are encrypted, they need to be put through a decryptor to open them, and acquiring it is difficult. At the moment, only users who have backups can recover files for free.

How to remove Trial_recovery ransomware

Trial_recovery ransomware is malware that encrypts files. It’s a severe infection that can result in permanently lost files. The ransomware can be identified by the .trial-recovery.[random characters].[random characters].-encrypted extension added to all encrypted file names. If you have a backup of your files, you can start file recovery as soon as you remove Trial_recovery ransomware from your computer. However, users without…

How to remove Angry stealer trojan

Angry stealer is referring to an information-stealing trojan. The developers are likely based in Russia but the malware is being sold to other cybercriminal groups. It focuses on stealing as much sensitive data as possible from infected devices. It’s a very serious infection that can cause a lot of damage, including lost access to sensitive accounts, financial loss, and identity theft.…

What is the “Is Visiting A More Convenient Way To Reach” email

“Is Visiting A More Convenient Way To Reach” email is a sextortion scam that falsely claims users’ computers have been infected with malware, which supposedly allowed its operators to create a video of users watching pornography. The contents of the email are completely fake but this particular email uses a new tactic to convince users of its legitimacy. This sextortion…