Site icon Virus Removal Guides

The following article aims to assist users in removing the screen-locking /account stealing virus called The removal guide is designed to work for all iPhones and MacBook Air.

In the event that the screen of your Apple iPhone or MacBook Air has been locked by somebody and you are now asked to contact, we might be able to help. This is one of latest screen-locking ransomware viruses that have been released at for whatever reason it has been targeting only Apple users, more specifically those with MacBook Air laptops and iPhones. The virus invades your system, after which it locks the screen and tells you that for more information you are to contact Many users are fooled into believing that this is some customer support service or legal authority and readily contact the email address on their screen. However, this is quite clearly a criminal scheme. If you went as far as to contact the hackers behind it, you will have likely come to that conclusion yourself.

Most victims so far have reported that they were asked to transfer 50 USD to the hackers and that would be enough to have their screens unlocked. This is about as classic a ransomware blackmail scheme as you get. And for this very reason it would be highly unadvisable to comply with the blackmailers’ demands. There are other options to getting the screen of your devices unlocked, and we are here to provide you with several of them. Below are a few steps that may help you remove from your iPhone or MacBook Air. The steps described here are easy and simple to follow and won’t require any special technical skills on your behalf. We will be more than happy to hear about your results once you’ve followed them in the comment section below.

And as this type of viruses has been on the rise lately, we also think it very important to keep our readers informed about possible prevention measures. Ransomware viruses, including the screen-locking sub-type that belongs to, are usually transmitted by getting users to click on or download infected content. Typically it comes in the form of spam emails containing attached files or links. Be on the lookout for these and avoid interacting with anything that seems suspicious or shady. Other possible transmitters are fake online ads, fake system update requests, notifications that appear on your screen saying your phone or computer has been infected, etc. Be very cautious around this type of messages and do not click on them. The same also goes for potential downloadable content. For the safety of your system we would advise you to only stick to reputable and trustworthy download sources as of now. Removal

You are dealing with a browser hijacker that can restore itself. We are sending you to another page with a removal guide that gets regularly updated. It covers in-depth instructions on how to:

  1. Locate and clean up your phone’s calendar events if they are infected.
  2. Find browser extensions related to the threat and how to remove them.
  3. Ensure your passwords were not stolen or tampered with.
    You can find the removal guide here.
Exit mobile version