Threats
Obsidiancutter.top is Just a Misleading Page, Despite Strange Name
During our exploration of untrustworthy websites, our diligent research team stumbled upon the dubious webpage obsidiancutter.top. This particular site is strategically designed to promote browser notification spam... Read more
Black Hunt 2.0 Ransomware Threatens to Leak Stolen Data
During our examination of recent submissions, our dedicated research team stumbled upon a menacing ransomware dubbed Black Hunt 2.0. This malicious software operates by encrypting valuable data and then demanding... Read more
Kiqu Ransomware Will Encrypt Victim Systems
In the course of analyzing malware samples, we came across a particular ransomware variant identified as Kiqu. This ransomware operates by encrypting files and modifying their filenames, adding the ".kiqu" extension.... Read more
Search-content.com Fake Search Engine
During our investigation into deceptive webpages, our researchers uncovered the existence of a fraudulent search engine called Search-content.com. We encountered this site through an installer associated with the Apps... Read more
SSEAR Ransomware Asks for $100 in Ransom Payment
SSEAR is a form of malicious software functioning as ransomware, with the sole intention of denying victims access to their files through encryption. It accomplishes this by adding "_SSEAR" to the original filenames... Read more
What is Shafmia Malware?
Trojan.Shafmia.A poses a significant threat to your device, carrying the potential for extensive harm, including file theft, alteration, and erasure. Moreover, it grants unauthorized access to sensitive information... Read more
Smartshopsearch.com Fake Search Engine
Smartshopsearch.com represents an untrustworthy search engine that typically gains traction through browser hijackers, which tamper with browser settings to trigger redirects to endorsed sites. Moreover, counterfeit... Read more
Beware! Kitu Ransomware Will Encrypt Your Data
During our thorough analysis of malware samples, we encountered a new strain of ransomware called Kitu. This particular malicious software employs a sophisticated file encryption technique to lock users out of their... Read more
What is ConfigInput Mac Adware?
While conducting an examination of newly submitted files, our research team came across an application known as ConfigInput. Upon thorough analysis, we determined that ConfigInput falls under the category of... Read more
Choalauysurvey.top Conducts Misleading Survey
During our investigation of suspicious websites, our research team came across the rogue page known as choalauysurvey.top. This website engages in promoting browser notification spam and redirecting visitors to other... Read more
Soccer Skills Rogue Browser Extension
After extensive examination, our analysis has revealed that the Soccer Skills browser extension functions as a browser hijacker, aiming to manipulate specific browser settings for promoting hsrc-withus.com.... Read more
Cerobgar Malware - What Exactly Is It?
Cerobgar is the handle and designated name given to a heuristic detection that can signify the presence of a Trojan horse on the system. However, due to Cerobgar being a heuristic handle, it can be attached to a... Read more
Iamadssystems.com Misleads Users With Fake Bot Check
While conducting routine examinations of untrustworthy online platforms, our researchers came across the deceptive website iamadssystems.com. This particular rogue page is involved in promoting browser notification... Read more
Kizu Ransomware is a Djvu Variant Pilfering Files
Kizu represents a variant of ransomware that performs encryption of files and appends the ".kizu" extension to all files it affects. In addition to this, it generates a ransom note entitled "_readme.txt," containing... Read more
'Mail Account Deactivation Notice' Email Scam
Upon careful examination of the "Mail Account Deactivation Notice" email, our analysis revealed that it is indeed a phishing attempt. The fraudulent email claims that the recipient's account is at risk of deactivation... Read more
KiRa Ransomware Will Hold Your Files Hostage
KiRa is the name of an insidious ransomware recently uncovered by our team during an analysis of malware samples. This malicious software operates by encrypting sensitive data, employing a clever tactic of appending a... Read more
Dulativergs.com Uses Misleading Bot Check
After careful examination, it has come to our attention that dulativergs.com employs deceptive techniques, including the display of a fabricated message, aiming to manipulate visitors into subscribing to... Read more
Browser-shielding.com Uses Old Scare Tactics
During a routine investigation of questionable websites, our researchers came across the rogue webpage browser-shielding.com. This webpage is specifically designed to promote scams and spam users with browser... Read more