Threats
'Product Availability Confirmation' Email Scam Attempts to Steal Credentials
Upon examining the "Product Availability Confirmation" email, we discovered that it is fraudulent. The false message appears to be a pressing purchase demand from the sender and operates as a phishing scam by... Read more
'Incoming Mails Have Been Restricted' Email Scam
The "Incoming Mails Have Been Restricted" email scam is a type of phishing scheme that attempts to trick individuals into providing personal information, such as their email login credentials. The scam typically... Read more
Why You Should Beware of the Searchstartnow.com Browser Hijacker Site
Searchstartnow.com is a browser hijacker that can take over your web browser without your consent or knowledge. Such a website has components that are usually designed to change your default homepage, search engine,... Read more
MQsTTang Backdoor Targets IoT Devices Exploiting System Vulnerabilities
MQTTang Backdoor is a Trojan horse threat that targets Internet of Things (IoT) devices and uses the MQTT (Message Queuing Telemetry Transport) protocol as a means of communication with its command and control... Read more
Locked Out: Goaq Ransomware and How to Protect Yourself
While analyzing malware samples from online threat databases, we identified Goaq, a member of the Djvu ransomware family. Goaq operates by encrypting files and adding the ".goaq" extension to encrypted file names. It... Read more
ActivityCache Joins AdLoad Adware Family
During our investigation of new threat database submissions, our research team stumbled upon the ActivityCache app. After examining this software, we concluded that it is adware and belongs to the AdLoad malware... Read more
Flowersforsunshine.com Will Try Push Ads in Your Browser
Flowersforsunshine.com is a website that uses push notifications to display spam pop-up ads on devices. It tricks victims into subscribing to its notifications through fake error messages and alerts. Once subscribed,... Read more
Why Bestdiscoveries.co Should Not Be Used For Searching The Internet
Bestdiscoveries.co is a browser hijacker that can affect users' web browsers, including Google Chrome, Mozilla Firefox, and Microsoft Edge. Once installed, it can change the browser's settings without the user's... Read more
What is Gosw Ransomware?
Gosw ransomware is a type of malware that encrypts files on a victim's computer or network, rendering them inaccessible. The attackers behind Gosw then demand a ransom payment in exchange for the decryption key... Read more
SkullLocker Ransomware Operated by Polish Speakers
We ran into yet another new variation of the Chaos ransomware called SkullLocker. This particular type of ransomware encrypts files and adds a ".skull" extension to the filenames. In addition, it creates a ransom note... Read more
MetAI Assistant Adware Poses Security Risk
During our examination of fraudulent websites, we stumbled upon a webpage promoting an installer that contains the MetAI assistant browser extension, which is advertised as a tool for utilizing OpenAI (presumably the... Read more
'ACCOUNT SHUT-DOWN' Email Scam Seeks New Victims
Upon our examination of the "ACCOUNT SHUT-DOWN" email, we determined that it is a spam message and a phishing scam. The email falsely claims that the recipient's email account is set to be shut down as per their... Read more
What Does The Clipbox Tab Browser Hijacker Do To Your Computer?
Clipbox Tab is a browser hijacker that has proven to be a major annoyance as it may affect popular web browsers like Google Chrome, Mozilla Firefox, and Internet Explorer. The effect of Clipbox Tab is that it may... Read more
PureBrowserAddonEdge.com Could Modify Browser Settings
PureBrowserAddonEdge.com is a browser hijacker that can take over your web browser and modify its settings without your consent. This malicious software is usually distributed through software bundles, fake software... Read more
What is Reopen Ransomware?
Reopen Ransomware is a type of malicious software that infects computer systems and encrypts the files just before demanding a ransom payment to supposedly unlock the files. Using a sophisticated encryption algorithm,... Read more
Goba Ransomware Will Hold Your Files Hostage
Our team of malware experts came across Goba, a type of ransomware that uses encryption to restrict access to files by adding the ".goba" extension to encrypted filenames. This ransomware belongs to the Djvu... Read more
Qwik Search Hijacks Browser Settings
While examining suspicious websites, our team discovered the Qwik Search browser extension, which claims to enhance online search experiences by providing easy access to popular search engines. However, after... Read more
Never Forget Tab Scrambles Your Browser Settings
During our investigation of the Never Forget Tab browser extension, we discovered that it is a browser hijacker that promotes two fake search engines, namely find.eonenavigate.com and neverforgettab.com. This... Read more