iolo WW

Tutorials

Useful tutorials on various PC troubleshooting topics. Video tutorials.

How to stop “Intuit QuickBooks Invoice” e-mail spam

0
Intuit QuickBooks is a popular accounting software used by many businesses. Unfortunately, cybercriminals have been using QuickBooks to launch phishing attacks and scams. One such scam is the Intuit QuickBooks Invoice email scam. This scam involves cybercriminals sending emails that appear to be legitimate QuickBooks invoices. The emails contain an attachment that, when opened, can infect the recipient's computer with malware. The malware can be spread through various methods, including spam campaigns, phishing emails, and malicious attachments. Cybercriminals can use botnets, which are networks of infected computers, to send spam emails to targeted victims. Once the malware infects the victim's computer, it can spread to other computers through spam emails and malicious software.

How to remove Black Berserk Ransomware and decrypt .Black files

0
Black Berserk Ransomware is a type of malware that encrypts data on a computer and demands payment for its decryption. It appends the .Black extension to the filenames of encrypted files. The ransomware uses a strong encryption algorithm, but the specific algorithm is not known. The ransom note created by Black Berserk Ransomware is called Black_Recover.txt. The note urges the victim to contact the attackers and states that the inaccessible files have been encrypted. Unfortunately, there are currently no decryption tools available for Black Berserk Ransomware. To prevent further encryption, the ransomware must be eliminated from the operating system. However, removal will not restore already compromised files. The sole solution is to recover them from a backup (if one was created prior and is stored elsewhere). It is highly recommended to keep backups in multiple different locations (e.g., remote servers, unplugged storage devices, etc.) to ensure data safety.

How to remove Wspn Ransomware and decrypt .wspn files

0
Wspn Ransomware is dangerous encryption virus, that enciphers sensitive data and demands a ransom payment in exchange for a decryption key to restore access to the encrypted files. Malware uses a combination of RSA and AES encryption algorithms to encrypt files. The encryption process is irreversible without the decryption key Wspn is a member of the Djvu ransomware family and modifies filenames by adding the .wspn extension to them. For example, Wspn alters the names of files such as sample.jpg to sample.jpg.wspn, sample2.png to sample2.png.wspn, and so on. Wspn Ransomware creates a ransom note named _readme.txt. The ransom note contains instructions on how to pay the ransom and obtain the decryption key. The ransom note is usually placed in every folder that contains encrypted files.

How to remove DUMP LOCKER Ransomware and decrypt .f**ked files

0
DUMP LOCKER Ransomware is a type of malware that encrypts important personal files such as photos, videos, and documents on a victim's computer. It adds an extra extension to every file, creating a pop-up window in every folder that contains the encrypted files. Once the encryption process is completed, DUMP LOCKER displays a ransom note message through a pop-up window on the victim's system. This message informs victims that their files have been encrypted and provides instructions on how to pay the ransom to obtain the decryption tool and regain access to their data. DUMP LOCKER Ransomware adds an extra extension to every file, creating a pop-up window in every folder that contains the encrypted files. The extension used by DUMP LOCKER Ransomware is .f**ked (censored). After the encryption process is concluded, DUMP LOCKER Ransomware displays a ransom-demanding message in a pop-up window. The ransom note warns against restarting the infected device, as that will result in permanent data loss.

How to remove Wsuu Ransomware and decrypt .wsuu files

0
Wsuu Ransomware is a type of malware that encrypts files on a computer and demands a ransom payment in exchange for the decryption key. It belongs to the Djvu/STOP family of ransomware. The ransomware encrypts a wide range of file types, including documents, pictures, and databases, and appends the .wsuu extension to the encrypted files, making them inaccessible and unusable. The ransom note is typically named _readme.txt and contains instructions on how to contact the criminals behind Wsuu and pay a ransom in exchange for the decryption key. The ransom amount ranges from $490 to $980, depending on the time passed after the attack, and is usually demanded in Bitcoin. Wsuu Ransomware uses the Salsa20 encryption algorithm to encrypt the files on the system. This encryption algorithm is not the strongest method, but it still provides an overwhelming amount of possible decryption keys. If Wsuu cannot establish a connection to the attacker's server before starting the encryption process, it uses the offline key. This key is the same for all victims, making it possible to decrypt .wsuu files in the future.

How to remove CriminalBot malware (Android)

0
CriminalBot malware is a type of malicious software that targets Android devices. It is designed to steal sensitive information such as login credentials, personal data, and financial details from infected devices. CriminalBot Malware can also monitor user activities, including calls, messages, and browsing behavior, to compromise user privacy. Once installed on an Android device, CriminalBot Malware can have various capabilities, including data theft, spying and surveillance, unauthorized access, ad fraud, and more. If users suspect that their Android device has been infected with CriminalBot Malware, they should take immediate action to remove the malware. This can be done by using anti-malware software (we recommend Norton Security for Android) to perform a system scan and eliminate potential threats. In some cases, users may need to reinstall the original Android operating system on their device to restart the security features provided by Google. Users should also change all of their passwords, including the device password and all online accounts that they may have used on the device or had connected to the device.

How to remove Wsaz Ransomware and decrypt .wsaz files

0
Wsaz Ransomware is a widespread cipher virus, that encrypts files on a victim's computer, making them inaccessible, and then demands a ransom in exchange for the decryption key. It is part of the Djvu ransomware family and is distributed through spam emails, fake software cracks, or by exploiting vulnerabilities in the operating system and installed programs. Once it infects a system, Wsaz alters the filenames of encrypted files by appending the .wsaz extension. For instance, a file named 1.jpg is renamed as 1.jpg.wsaz, 2.png becomes 2.png.wsaz, and so on. Wsaz Ransomware uses Salsa20 encryption algorithms to scramble the contents of the targeted files. The strong ciphering method employed by the Wsaz virus makes it quite challenging, if not impossible, to find the decryption key without cooperating with the attackers. Wsaz Ransomware generates a ransom note in a file named _readme.txt that is typically dropped in each affected folder.

How to stop “Network Solutions” e-mail spam

0
The Network Solutions email scam is a phishing spam campaign that targets users of the Network Solutions email service. The scam emails are disguised as storage-related notifications from Network Solutions, a legitimate technology company that is a subsidiary of Web.com, one of the largest .com domain name registrars. The goal of the fraudsters is to trick users into opening a phishing page that will collect all entered information, mainly email account credentials. The fake emails state that the recipient's mailbox is nearing its maximum capacity and if the limit is exceeded, the user will no longer be able to receive, send or store emails. To fix this non-existent issue, users are directed towards opening the provided link to supposedly add more storage. The visual design of the phishing page that is then opened will be similar to the official Network Solutions website, but the URL will be different. Interacting with the Network Solutions email scam can lead to severe privacy issues, financial losses, and identity theft. By trusting the scam emails, users can experience these risks. Therefore, it is crucial to immediately change the passwords of all potentially compromised accounts and contact their official support.