Threats
Ithh Ransomware Uses Djvu Codebase
While examining new malware samples, we stumbled upon a ransomware variant known as Ithh. This ransomware is responsible for encrypting files and adjusting their file names by affixing the ".ithh" extension.... Read more
Horizon Timez Browser Extension
While investigating deceptive websites, our research team came across the Horizon Timez browser extension, which claims to offer "video-themed" browser wallpapers. Upon scrutinizing this software, we concluded that it... Read more
Searchtabs.io Comes With Persistence Mechanism
Searchtabs.io is the URL of a counterfeit search engine. While examining suspicious websites, our team stumbled upon a deceptive webpage that used explicit content to entice users into downloading an installation... Read more
Hjutm Ransomware Displays Ransom Note Written in Russian
Hjutm is a type of ransomware from the Xorist family, and it was discovered during an analysis of malicious file samples. Hjutm is specifically designed to encrypt files, alter their filenames by adding the ".hjutm"... Read more
News-vaduza.cc Attempts to Mislead Visitors
News-vaduza.cc is a misleading website that users may encounter while browsing less secure parts of the internet, such as platforms offering unauthorized software downloads or copyrighted content streaming.... Read more
'Operating System Blocked Due To Questionable Activity' Pop-Up Scam
While investigating suspicious websites, our researchers came across the "Operating System Blocked Due To Questionable Activity" technical support scam. The primary goal of this deceptive content is to deceive users... Read more
Itqw Ransomware Demands Initial Ransom of $490
While analyzing newly submitted malware samples, we came across a type of ransomware known as Itqw. This malicious software is responsible for encrypting files and altering their names by appending the ".itqw"... Read more
Google Safe Browser Total Protection Pop-Up Scam
While examining deceptive websites, our team came across the "Google Safe Browser Total Protection" scam. This fraudulent scheme masquerades as a browser security tool from Google, purportedly capable of identifying... Read more
Rain or Shine Rogue Browser Extension
Rain or Shine falls into the category of browser hijackers because of its ability to alter critical browser settings, such as the homepage, new tab address, and default search engine. Users may also encounter an... Read more
Choose All Languages Adware
The Choose All Languages application is promoted as a browser enhancement tool designed to simplify text translation with a straightforward right-click feature within the browser. However, upon further examination, it... Read more
Close All Tabs Adware
The Close All Tabs application is marketed as a convenient tool that allows users to swiftly close all open tabs, including pinned tabs and those in incognito mode, with a single click. However, upon examination, it... Read more
Earth Grass Ransomware Asks for $200 in Ransom
While analyzing file samples, we stumbled upon a new variant of the WORLD GRASS ransomware, which was named EARTH GRASS. This particular ransomware operates by encrypting files and adding the ".34r7hGr455" extension... Read more
Tab Clear Adware
While investigating suspicious websites, our researchers stumbled upon the Tab Clear browser extension. This extension is marketed as a tool that can close all types of browser tabs with a single click. Upon our... Read more
Nightnitroglass.com Shows Fake Anti-Bot Captcha
During the examination of nightnitroglass.com, it has come to our attention that the website's primary intent is to trick visitors into granting it permission to send notifications. To achieve this,... Read more
Keylock Ransomware Uses Lengthy Ransom Note
Our researchers identified Keylock as a type of ransomware program during a regular examination of new file submissions. Ransomware functions by encrypting files and then demanding payment for their decryption. On our... Read more
New Key Browser Extension
After an examination of the New key browser extension, it has been determined that its primary function is to operate as a browser hijacker. Specifically, this application is designed to alter the settings of... Read more
Gemshaper.top Shows Misleading Anti-Bot Check
While investigating questionable websites, our research team came across gemshaper.top, a deceitful page with two distinct appearances. Both versions employ counterfeit CAPTCHA tests to encourage browser notification... Read more
Vespy Grabber Comes With Various Infostealing Capabilities
Vespy Grabber is a highly advanced and multifaceted malicious software that presents a serious danger to both individual users and organizations. This malware is renowned for its extensive range of capabilities, which... Read more