malwarebytes banner

Viruses

Discover essential defenses in the “Viruses” category at BugsFighter.com, where we provide comprehensive coverage on combating the myriad of digital threats that can compromise your devices and privacy. This section is dedicated to identifying, understanding, and removing viruses that affect computers, smartphones, and other digital platforms. From detailed analysis of new and evolving threats to step-by-step removal guides, our content is crafted to empower users with the knowledge they need to protect themselves. Whether you’re dealing with a stubborn infection or seeking to prevent future attacks, our expert advice and practical solutions are here to safeguard your digital life.

How to remove GandCrab v5.0.4 Ransomware and decrypt .[random-letters] files

0
GandCrab V4 Ransomware fourth generation of notorious GandCrab Ransomware. Virus uses complex combination of AES-256 (CBC-mode), RSA-2048 and Salsa20 encryption algorithms. This particular version adds .KRAB extension to encrypted files and creates slightly different ransom note called KRAB-DECRYPT.txt. GandCrab V4 Ransomware demands ransom in BitCoins. Usually, it varies from $200 to $1000. Malware encrypts all types of files except ones in the whitelist and some necessary for Windows operation. All photos, documents, videos, databases get exncrypted after indection. Virus uses WMIC.exe shadowcopy delete command to remove shadow copies and reduce the chances of recovery. Unfortunately, at the moment we write this article, current decryption tools cannot decrypt GandCrab V4 Ransomware, but we will still provide links to this utilities as they can be updated any day.

How to remove Qweuirtksd Ransomware and decrypt .qweuirtksd files

0
Qweuirtksd Ransomware is dangerous ransomware-type virus, that encrypts user files using AES-128 cryptography algorithm and demands $500 ransom in Bitcoins for decryption. All files encrypted by this malware receive .qweuirtksd extension. In most cases, Qweuirtksd Ransomware is initiated after manual (or semi-automatic) hacking of the computer. Attacks are coming from IP adresses in Russia, and according to the information on BleepingComputer forum malefactors are russians. Hackers offer to negotiate to reduce ransom amount for private users. We do not recommend to pay the ransom and attempt restoring encrypted files with help of instructions on this page.

How to remove Dharma-AUDIT Ransomware and decrypt .AUDIT files

0
AUDIT Ransomware is yet another version of notorious ransomware virus from Crysis-Dharma-Cezar family. Now it adds .AUDIT extension to encrypted files (please, do not confuse with Nessus Pro's report files). This variation of ransomware currently doesn't have decryptor, however, we recommend you to try instructions below to recover affected files. Dharma-AUDIT Ransomware appends suffix, that consists of several parts, such as: unique user's id, developer's e-mail address and, finally, .AUDIT suffix, from which it got its name. The pattern of filename modification looks like this: file called 1.doc will be converted to 1.doc.id-{8-digit-id}.[{email-address}].AUDIT. According to our information, hackers demand $10000 ransom from the victims. Bad news are, that using cryptocurrency and TOR-hosted payment websites makes it almost impossible to track the payee. Besides, victims of such viruses often get scammed, and malefactors don't send any keys even after paying the ransom. Unfortunately, manual or automatic decryption is impossible unless ransomware was developed with mistakes or has certain execution errors, flaws or vulnerabilities. We do not recommend to pay any money to malefactors. However, good news are, that often, after some period of time security specialists from antivirus companies or individual researchers decode the algorithms and release decryption keys or police finds servers and unveils the master keys.

How to remove CryptConsole 3 Ransomware and decrypt your files

0
CryptConsole 3 Ransomware is the successor of CryptConsole and CryptConsole 2 ransomware viruses. This crypto-extortionist encrypts data on servers and PCs using AES, and then requires a ransom of 0.14 BTC (or sometimes $50) to return files. Virus was created on C# for the Microsoft .NET Framework. The third generation of CryptConsole started spreading in June, 2018. Most of variations extort 50$. They offer to decrypt 1 file for free, but the overall cost will then increase on 50$. Mention that CryptConsole 1 and CryptConsole 2 can be decrypted with a tool developed by Michael Gillespie (download below). The third version is currently undecryptable. You can restore files form bacckups, but if you don't have backups, follow instructions below to attmempt restoring files using standard Windows featutes or using file-recovery software.

How to remove GANDCRAB V5.0.5 Ransomware and decrypt .[5-6-7-8-9-random-letters] files

0
GandCrab V5.0.5 Ransomware is fifth generation of high-risk GandCrab Ransomware. Probably, this virus was developed in Russia. This crypto-extortor encrypts user and server data using the Salsa20 algorithm, and RSA-2048 is used for auxiliary key encryption. 5-th version appends .[5-random-letters] extension to encrypted files and creates ransom note called [5-random-letters]-DECRYPT.txt. Examples of ransom notes: VSVDV-DECRYPT.html, FBKDP-DECRYPT.html, IBAGX-DECRYPT.html, QIKKA-DECRYPT.html. GandCrab V5.0.5 Ransomware demands $800 ransom in BitCoins or DASH cryptocurrencies for decryption. However, often, malefactors deceive users and don't send keys. Thus, victim won't recover her/his files, but put credentials at risk on doubtful exchange of cryptocurrencies.

How to remove Minotaur Ransomware and decrypt .Lock files

0
Minotaur Ransomware is new type of ransomware, that encrypts user files and demands 0.125 Bitcoins for decryption. All files encrypted by Minotaur receive .Lock extension. According to security specialists, Minotaur Ransomware firstly attacks data on flash drives, and only then switches to local drives. Currently, there is no way to return captured files. If you have backups, you need to remove Minotaur Ransomware from your computer, make sure it is not active and restore from backups. Otherwise, you can make attempt to recover files using instructions below (restore points, previous versions of files, data recovery software). Please, remember, that by paying to racketeers, you put your credentials at risk. Often, after some time antivirus companies or individual enthusiasts break encryption algorithms amd release decryption tools. Of you won't succeed in restoring your files today, preserve important data for possible recovery in future.

How to remove STOP Ransomware and decrypt .KEYPASS, .WHY or .SAVEfiles files

0
In this article we descrbe third generation of STOP Ransomware, previous two versions were described by our team earlier. This variation was actively spreaded in August and September, 2018. Virus already attacked users from 25 countries including Brazil, Chile, Vietnam, USA, United Arab Emirates, Egypt, Algeria, Indonesia, India, Iran, Poland, Belarus, Ukraine. This variation uses uses symmetric and asymmetric cryptography and adds .KEYPASS, .WHY or .SAVEfiles extensions to the files after encryption. Intruders demand $300 ransom for decryption. They offer to decrypt up to 3 random files for free, to prove that decryption is possible. Hackers also warn, that if amount is not paid within 72 hours data restoration will be impossible.

How to remove Facebook.com virus (Mac)

0
Facebook.com (a.k.a Facebook App or just Facebook) is advertising application for Mac, that opens Facebook.com website on MacOS startup and adds itself to the Dock. At a first sight, it seems harmless, however with this application malefactors can get access to browser data and settings, and use it to display targeted advertising, pop-ups in Safari or Google Chrome. We recommend you to remove Facebook.com virus application from Mac and remove residual data.