Remove Cikadron.co.in

Any clues on getting rid of this fake scan

Remove Cikadron.co.in Pop-up Ads [Virus Removal Guide] January 8, 2026
https://malwaretips.com/blogs/remove-cikadron-co-in/

Remove Cikadron.co.in Pop-up Ads [Virus Removal Guide] January 11, 2026
https://malwaretips.com/blogs/remove-cikadron-co-in-2/

=============================================

  • Did you clear browser cookies n’ cache?
  • Do you run browser sync?
  • Did you recently install any program / browser extension?
  • Did you recently allow push notifications?
  • Did you recently change site permissions?
  • Did you reset browser?
  • Did you run Norton Full Scan?
  • Did you run Malwarebytes Scan?

Adware and PUPs families add push notifications as an attack vector
Browser push notifications: a feature asking to be abused
Resetting Google Chrome to clear unexpected issues
Web Browser Cleaning
Browser Push Notifications
Reset Chrome settings to default

===========================================

To remove Cikadron.co.in, you need to revoke its permission to send notifications in your browser. This site is not a virus itself but an advertising platform that uses browser notifications to push spam or potentially malicious links.

Manually Block Notifications
Follow these steps for your specific browser to stop the pop-ups immediately:

  • Google Chrome (Desktop & Android):
    Open Settings via the three dots (â‹®) in the top-right corner.
    Go to Privacy and security > Site Settings > Notifications.
    Find cikadron.co.in in the “Allowed to send notifications” list.
    Click the three dots next to it and select Block.
  • Mozilla Firefox:
    Open Settings and click Privacy & Security.
    Scroll to Permissions and click Settings next to Notifications.
    Locate the URL, change its status to Block, and click Save Changes.
  • Microsoft Edge:
    Open Settings > Cookies and site permissions > Notifications.
    Under the Allow section, find the suspicious URL and click Block

Deep Clean Your Device
If ads persist or your browser behaves strangely (e.g., redirects, new toolbars), your device may have “adware” or a “browser hijacker” installed.

  • Run a Malware Scan: Use reputable tools like Malwarebytes to automatically find and remove hidden malicious files.
  • Check Installed Apps: On Windows or Android, look for recently installed programs you don’t recognize and uninstall them.
  • Clear Browser Cache: After blocking the site, clear your browsing history, cookies, and cache to remove any remaining tracking data.

Pro Tip: Always choose Block rather than “Remove” in your notification settings; “Remove” allows the site to ask for permission again the next time you visit.

=================================

Cikadron.co.in is a deceptive website that uses fake “system scans” and virus alerts to trick users into allowing browser notifications or downloading unwanted software. To remove these alerts and the underlying cause, follow these steps:

Disable Browser Notifications
Most users see these “scans” because they accidentally granted the site permission to send notifications.

  • Google Chrome: Go to Settings > Privacy and security > Site Settings > Notifications. Under “Allowed to send notifications,” find Cikadron.co.in, click the three dots, and select Block or Remove.
  • Microsoft Edge: Go to Settings > Cookies and site permissions > Notifications. Locate the suspicious URL under the “Allow” section and select Block.
  • Mozilla Firefox: Go to Settings > Privacy & Security > Permissions > Notifications (click “Settings”). Find the site and change the status to Block.
  • Android (Chrome): Tap the three dots > Settings > Site settings > Notifications. Tap on the suspicious URL and select Block or Remove.

Remove Suspicious Extensions
Adware often disguises itself as helpful browser extensions.

  • Access your browser’s extension menu (e.g., chrome://extensions/ in Chrome).
  • Look for any extensions you don’t recognize or that were installed around the time the pop-ups started, and click Remove.

Run a Malware Scan
To ensure no malicious files remain on your system, run a scan with trusted security software:

  • Use a reputable scanner like Malwarebytes Free or AdwCleaner to detect and eliminate hidden adware.

Clear Browser Data
Residual cookies or cached files from the malicious site can sometimes trigger redirects.

  • Go to your browser settings and Clear browsing data (select “Cookies and other site data” and “Cached images and files”).

Critical Warning: Never click “Fix All,” “Clean Device,” or any download buttons within these pop-up windows. These are fake and intended to lead you to phishing sites or further malware.

================================

Cikadron.co.in is a deceptive website that uses fake virus warnings and clickbait to trick users into enabling browser notifications. Once allowed, it bombards users with intrusive pop-up ads and promotes potentially malicious content. MalwareTips provides a free, step-by-step removal guide to help users clean their devices and stop these notifications.

Recommended Removal Steps
Follow these instructions to stop the Cikadron.co.in pop-ups and secure your browser:

  • Disable Browser Notifications: Access your browser’s settings, search for “Notifications,” find Cikadron.co.in in the allowed list, and select Remove or Block.
  • Run a Malware Scan: Use a reputable on-demand scanner like the Malwarebytes Download recommended by MalwareTips to detect and quarantine any underlying adware.
  • Check Installed Programs: Review your computer’s “Programs and Features” or your mobile device’s app list for any recently installed apps you don’t recognize and uninstall them.
  • Reset Browser Settings: If the ads persist, consider resetting your browser to its default settings to remove any unauthorized changes made by the adware.

Identifying the Scam

  • Deceptive Tactics: The site often displays prompts like “Click Allow to play the video” or “Tap Allow to continue” to trick you into subscribing to its notifications.
  • Fake Alerts: You may see warnings claiming your computer is infected or your system key has expired; these are fake and intended to make you call “tech support” numbers or download untrustworthy software.
  • MalwareTips Legitimacy: While MalwareTips is a widely recognized resource for malware removal, always ensure you are on the official MalwareTips blog to avoid potential “fake” or “copycat” sites.

=============================

Note: AI sourced content may make mistakes

1 Like

Malwarebytes scan is a straightforward process whether you are using the free or premium version. Follow these steps to get your system protected:

  1. How to Install Malwarebytes
  • Download the Installer: Visit the official Malwarebytes website and click the Free Download button to get the latest setup file (usually named MBSetup.exe).
  • Run the Setup: Locate the file in your Downloads folder and double-click it. If Windows asks for permission (User Account Control), click Yes.
  • Follow the Wizard:
    • Click Install.
    • Choose your device type: Personal (Me or my family) or Business.
    • You may see an offer for “Browser Guard”—you can choose to Skip or install it based on your preference.
  • Complete Setup: Once finished, click Open Malwarebytes. You will be asked to “Get Started,” where you can sign in to an existing account, start a 14-day premium trial, or just click Maybe Later to use the free version.
  1. How to Run a Scan
  • Open the App: Launch Malwarebytes from your desktop or Start menu.
  • Start the Scan: On the main dashboard, click the large Scan button. This initiates a Threat Scan, which is the recommended mode for checking common malware hiding spots.
  • Wait for Completion: The scan typically takes between 5 and 20 minutes. You can continue using your computer, but it may run slightly slower during this time.
  • Review & Clean:
    • No Threats Found: Click Done.
    • Threats Detected: A list of suspicious items will appear. Ensure the items you want to remove are checked and click Quarantine.
    • Restart: If prompted, restart your computer to fully remove the detected threats.

===================================================

Malwarebytes AdwCleaner is a free, portable tool that removes adware, browser hijackers, and PUPs. Download it from the official Malwarebytes site, save the .exe file to your desktop, and run it as an administrator. Click “Scan Now,” review findings, and select “Clean & Repair” to remove threats.

Step-by-Step Installation & Scan Guide

  1. Download: Navigate to the official AdwCleaner page and click “Free Download” to save the executable file.
  2. Run: Locate the file (usually in your Downloads folder) and double-click it to run, as it does not require a traditional installation process.
  3. Permissions: Click “Yes” if prompted by User Account Control (UAC) to allow changes.
  4. Accept Terms: Click “Agree” to the license agreement.
  5. Scan: Click the Scan Now button on the dashboard.
  6. Review and Clean: Once the scan finishes, review the list of detected threats, then click Clean & Repair.
  7. Restart: AdwCleaner will prompt you to close all programs and restart your computer to finalize the removal process.

Important Tips

  • Close Programs: Ensure all browsers and applications are closed before running the scan.
  • Pre-installed Apps: If you wish to keep pre-installed manufacturer applications, uncheck them in the scan results before clicking “Clean”.
  • Log Files: A log file is generated after the scan, which can be reviewed to see exactly what was removed.

=======================

Note: AI sourced content may make mistakes

1 Like

Hello @trevor_howard
Care to share your progress

Hello @trevor_howard
Care to share your progress

That worked fine, except the path to the setting was different - many thanks

1 Like

Thanks for sharing your progress