malwarebytes banner

Tutorials

Useful tutorials on various PC troubleshooting topics. Video tutorials.

How to fix an unknown error occurred (1667) on iTunes

0
While trying to update, restore or sync iPhone, iPad, or other iOS devices some users get unlucky to enter a 1667 error that prevents it. The message that intervenes in the updating/restoration process usually appears as a pop-up window and states the following: "There was a problem downloading the software for the iPhone. An unknown error occurred (1667).". The most common causes of this and other similar issues (e.g., errors 53, 14, 10, 2015, 1110, 3194, 2005, 2003, etc.) are badly connected or damaged USB cables, outdated software, insufficient space, compatibility issues, internet connection, and other possible issues as well. In this guide, we have gathered a number of easy-to-perform solutions that will help you potentially address the 1667 error and finally restore or update your device.

How to remove Mimic Ransomware and decrypt .QUIETPLACE files

0
Mimic is the name of a ransomware infection that encrypts access to data, appends the .QUIETPLACE extension, and eventually demands victims to pay ransom for the decryption. This virus is one of the variants among other file encryptors that were developed supposedly by the same cybercriminals. Other versions are known to assign extensions like .HONESTBITCOIN, .Fora, .PORTHUB, .KASPERSKY or extensions consisting of 5-10 random characters. During encryption, the malware will target all potentially important file types and make them no longer accessible by running strong algorithmic encryption. As mentioned, Mimic Ransomware also appends its own .QUIETPLACE extension, meaning a file like 1.pdf will likely change to 1.pdf.QUIETPLACE, and so forth. Following this, Mimic displayed two identical ransom notes - one before the log-in screen and second in a text file named Decrypt_me.txt.

How to remove NEVADA Ransomware and decrypt .NEVADA files

0
NEVADA is a ransomware virus that encrypts data on Windows and Linux operating systems and urges victims to pay money for its decryption and non-disclosure of collected information. At the time of encrypting access to data, the virus also assigns its .NEVADA extension to affected files. For instance, a file originally named 1.pdf will change to 1.pdf.NEVADA reset its icon, and become no longer usable. Following this, the malware creates readme.txt - a text note with decryption guidelines. Cybercriminals behind NEVADA Ransomware may vary since this file encryptor is open for purchase by other malefactors (Ransomware as a service model).

How to remove Erop Ransomware and decrypt .erop files

0
Erop is a new ransomware variant derived from the STOP/Djvu family. Malware of such is designed to encrypt users' data and demand victims to pay money for its decryption. Apart from becoming inaccessible after encryption, the targeted files also get altered visually—by receiving the new .erop extension. To illustrate, a file like 1.pdf will change to 1.pdf.erop and become no longer accessible. Once successful encryption gets to a close, Erop generates a text note called _readme.txt which contains decryption guidelines. This ransom note name is quite generic and has been used by other STOP/Djvu variants as well, only with slight variance in cybercriminals' contact information. Inside this note, victims are told it is necessary to purchase specialized decryption software for $980 (or $490 if paid within 72 hours after infection). While establishing e-mail communication with swindlers, victims can also attach 1 encrypted file that contains no valuable information and cybercriminals will decrypt it for free.

How to remove Nigra Ransomware and decrypt .nigra files

0
Nigra is the name of a recently reported file encryptor that is considered to be a variant of Sojusz Ransomware. Cybercriminals behind the successful attack encrypt access to data and then attempt to extort money from victims for the decryption. Files encrypted by this infection will likely be altered according to this pattern [victim's ID>].[cybercriminals' e-mail address] or [victim's ID>].[filename] and the .nigra extension at the end. This means the affected file may appear like this .[9347652d51].[nigra@skiff.com].nigra or else wise. Note that the process of adding new extension to original filenames is only a visual formality and does not change the fact of file encryption in any way. Following complete encryption, the virus will leave a text file with decryption guidelines on a victim's desktop. The text note name by Nigra Ransomware has not been yet publicly disclosed, however, it is likely something same or similar to these examples -----README_WARNING-----.txt, #_README-WARNING_#.TXT, README_WARNING_.txt,!!!HOW_TO_DECRYPT!!!.txt, #HOW_TO_DECRYPT#.txt, #HOW_TO_DECRYPT#.txt.

How to remove Erqw Ransomware and decrypt .erqw files

0
Erqw Ransomware is a type of malware that encrypts the victim's files and demands a ransom payment in exchange for the decryption key. It belongs to the family of STOP Ransomware, that started its activity in 2017. This particular version appeared in the beginning of February 2023. The malware typically spreads through phishing emails, malicious software downloads, or exploiting vulnerabilities in the victim's computer or network. Once the malware infects a system, it will encrypt the victim's files and add the .erqw extension to the filenames. The attackers will then demand a ransom payment, often in the form of cryptocurrency, in exchange for the decryption key. Contact details and additional information is disclosed in ransom note file (_readme.txt). It is not recommended to pay the ransom as there is no guarantee that the attackers will actually provide the decryption key. Additionally, paying the ransom supports criminal activities and may make you a target for future attacks. Instead, victims of Erqw Ransomware should focus on removing the malware from their systems and restoring their files from a backup if possible. If you are unsure of how to do this, read this article from our team of trusted IT professionals and cybersecurity experts.

How to remove Assm Ransomware and decrypt .assm files

0
Notorious STOP Ransomware continues its distribution with minor modifications. Since the end of January 2023, new extension appeared: .assm. It encrypts victims' files the same way as hundreds of its predecessors. STOP Ransomware manages to infect tens of thousands of computers with each version, and new versions appear several times a week. At the same time, it distributes the AZORult trojan-stealer, which steals confidential information. It is capable of stealing various user data: information from files, browser history, passwords, cookies, online banking credentials, cryptocurrency wallets, and more. Virus modifies the hosts' file to block Windows updates, antivirus programs, and sites related to security news, selling antivirus software. This version of STOP Ransomware still uses the following e-mail addresses: support@freshmail.top and datarestorehelp@airmail.cc. Assm Ransomware creates _readme.txt ransom note file.

How to remove Sickfile Ransomware and decrypt .sickfile files

0
Sickfile Ransomware is a malicious infection that uses strong encryption to hold victims' data hostage and blackmail them into paying money for its decryption. If your files acquired the new .sickfile extension and lost their icons, then it is likely a sign indicating they have been encrypted successfully. The how_to_back_files.html file is where cybercriminals subsequently explain how to revert the effects of encryption – i.e., return access to data. Here is a full text presented within the note. Overall, threat actors say decryption is possible if victims contact the swindlers and pay for the special decryption software. The communication is to be established either through the attached link or one of the given e-mail addresses. In case victims fail to contact the cybercriminals within 72 hours, it is said the price for decryption will become higher. On top of that, extortionists threaten to leak the encrypted data to public resources or sell it to third-party figures in case no payment will be made eventually.