Threats
Browser Cleaner Pro Rogue Browser Extension Warrants Removal
Browser Cleaner Pro is promoted as a powerful tool specifically designed to efficiently eliminate browsing data and cookies. However, during our evaluation of this browser extension, our team discovered that it... Read more
Tophome24.com Pushes Ads with Fake Bot Check
During our analysis of tophome24.com, we encountered its intention to present unreliable notifications. Tophome24.com utilizes a misleading message aimed at enticing visitors to grant permission for receiving its... Read more
Vaze Ransomware is a Djvu Clone Seeking Destruction of Files
During our examination of malware samples, we encountered a variant of the Djvu ransomware family known as Vaze. This specific ransomware operates by encrypting files and altering their original filenames by adding... Read more
Nature-Newtab Rogue Browser Extension
While investigating suspicious websites, our research team came across a rogue browser extension called Nature-Newtab. This extension operates by modifying browser settings to promote the illegitimate search engine... Read more
The AhRat Remote Access Trojan Targets Android Device and Their Stored Data
AhRat is a malicious Remote Access Trojan (RAT) that primarily targets Android devices. It was distributed through a trojanized screen recording application disguised as a legitimate app on the Google Play store. The... Read more
What Does 'Personalized Background' Browser Hijacker Do To Your Computer?
The Personalized Background browser hijacker is a type of malicious software that takes control of the user's browser settings and manipulates them for its own purposes. When installed, they app may replace the... Read more
Fast Cars Tab Browser Extension
During our investigation into the Fast Cars Tab extension, we have uncovered that it takes control of web browsers by making unauthorized changes to their settings. The main objective of this extension, which acts as... Read more
PowerExchange Malware Targets UAE Government Bodies
A new form of malicious software has been identified, dubbed PowerExchange, which is believed to have been used by the Iranian state-backed hacking group APT34, also known as Oilrig. This PowerShell-based malware was... Read more
Play Audio Adware Masquerades as Browser Extension
During the investigation of untrustworthy websites, our research team made a unique discovery regarding the Play Audio browser extension. This particular extension is advertised as a tool that enhances users' ability... Read more
Mediatesupervis.com Pushes Ads Using Fake File Download
Upon investigating mediatesupervis.com, our analysis revealed that the website employs a deceptive strategy to lure visitors into granting permission for notifications. Furthermore, we observed that... Read more
Car Tab Browser Hijacker Modifies Internet Settings Without Permission
Car Tab is a notorious browser hijacker that manipulates the settings of web browsers to promote specific websites. Like other browser hijackers, Car Tab takes control of various browser elements such as homepages,... Read more
Beware! Jackal Malware Becomes a Master at Manipulation
A notorious Advanced Persistent Threat (APT) group named GoldenJackal has recently developed a potent collection of .NET malware tools known as Jackal. This malicious toolset, comprising various components like... Read more
Pioxu.live Attempts Fake Virus Warning Scares
Pioxu.live is an misleading webpage URL that our researchers came across while investigating untrustworthy websites. Its purpose is to promote scams and flood users with browser notification spam. Moreover, it has the... Read more
Vapo Ransomware Will Lock Your System
During our evaluation of recently submitted malware samples, our team uncovered Vapo, a member of the Djvu ransomware family. Vapo operates by encrypting files on the victim's computer and demands a ransom payment in... Read more
Captchagenius.top Spams Ads, Using Fake Bot Check
While investigating suspicious websites, our team came across Captchagenius.top, an untrustworthy webpage with malicious intent. Its primary operation involves promoting browser notification spam and redirecting... Read more
'Your Account Is Successfully Debited' POP-UP Scam
Upon conducting an analysis of a webpage displaying the 'Your Account Is Successfully Debited' pop-ups, we have discovered that it employs deceptive tactics by presenting a fictitious system scan to coerce users into... Read more
'Shapes Tab' Browser Hijacker Pushes Fake Search Engine Sites
Shapes Tab is a malicious browser extension that has been identified as a rogue application by security experts. Disguised as a tool for displaying browser wallpapers, it actually operates as a browser hijacker,... Read more
Better Webb Browser Tool Fails To Provide Help for Users
Better Webb is a browsing application that aims to provide assistance to inexperienced or uninformed users, enabling them to navigate the internet with a better understanding of its operations. However, it is... Read more