Malware

Remove “Your Chase Banking Has Been Disabled” email

The “Your Chase Banking Has Been Disabled” email falls into the phishing category. The email is part of a phishing campaign that tries to steal users’ Chase login credentials. The email is disguised as a security notification from Chase, informing users about the supposed disablement of their online banking because of multiple incorrect attempts to log in. To supposedly restore…

Remove “Avoid Getting Locked Out” email

The “Avoid Getting Locked Out” email is part of a phishing campaign that targets users’ Webmail login credentials. The email is disguised as a notification email from the email service provider Webmail and asks that users re-authenticate their accounts. If recipients fail to re-authenticate their accounts, they may be locked out. The email provides a button for users to click to…

Remove “Capital One – Purchase Was Charged To Your Account” email

The “Capital One – Purchase Was Charged To Your Account” email is part of a malicious campaign that intends to phish users’ Capital One login credentials. The email is disguised as a purchase notification from Capital One and informs recipients that there is a pending purchase of $2,169.90 from United Airlines. The email provides a link for recipients to review the…

Remove “Capital One – Card Restricted” email

The “Capital One – Card Restricted” email is part of a phishing campaign that targets Capital One customers. The main goal of this phishing campaign is to steal users’ Capital One login credentials. There has recently been a significant increase in these emails specifically targeting Capital One customers, so users need to be very cautious. This particular email claims that users…

Remove Lucky (MedusaLocker) ransomware

Lucky ransomware will target your personal files and encrypt them. This ransomware is part of the MedusaLocker ransomware family. It takes files hostage by encrypting them and then demands a payment for a decryptor. The ransomware can be identified by the .lucky777 extension it adds to encrypted files. Unfortunately, only users who have backups can currently recover files for free.…

Remove “OneDrive – Encrypted EFT Document” email

The “OneDrive – Encrypted EFT Document” email falls into the phishing category. The email falsely claims that you have an unread EFT Payment Document waiting for you but if you engage with the email and click on the link, you’ll be taken to a phishing site. If you type in your login credentials on this phishing site, they will be stolen…

Remove “Time Is Slipping Away From Your Grasp” sextortion email

The “Time Is Slipping Away From Your Grasp” email falls into the sextortion email category. It’s a generic scam email that falsely claims your computer has been infected with malware, which supposedly allowed the sender to record you watching pornography. The sender threatens to release the video publicly and send it to all your contacts unless you agree to pay.…

Remove FOX ransomware

FOX ransomware is file-encrypting malware from the Dharma family. Because it targets personal and important files, it’s considered to be a very serious and dangerous infection. The ransomware can be identified by the .unique ID.[secretuser@tuta.io].SCRT extension added to encrypted files. Unfortunately, you will not be able to open files that have this extension. To be able to open them, you…

Remove “Login From A New Device” phishing email

The “Login From A New Device” email is a generic phishing attempt that tries to phish your email login credentials. The email is disguised as a notification from the email service provider about an unrecognized login attempt. The email asks that users check their accounts as soon as possible by clicking on the link if the login attempt was not them.…

Remove CipherLocker ransomware

CipherLocker ransomware is malware that takes files hostage by encrypting them. The ransomware targets personal files and makes them unopenable. Encrypted files will have the .clocker extension added to them, and the extension is how the ransomware can be identified. Unfortunately, to be able to open the files, you will need to use a decryptor on them. However, getting the…