Threats
Hola Browser - A Potential Malware Trap for Your Online Security
The Hola Browser is a browser that is customized and based on the Google Chromium browser. It comes with the Hola VPN Unlocker extension built-in, which was removed from the Google Extensions Chrome Web Store due to... Read more
Jywd Ransomware Doubles Ransom Demand in Three Days
Our team came across Jywd, a variant of the Djvu ransomware family, while examining ransomware samples. Jywd encrypts data and adds the ".jywd" extension to the filenames of the affected files. In addition, Jywd... Read more
Beware! 'Max-Lotto' Email Scam Seeks New Victims
Upon examining the "Max-Lotto" email, we have determined that it is a fraudulent email designed to deceive people. This spam email pretends to be from "Max-Lotto" and claims that the recipient has won a lottery prize.... Read more
Warning! Nexus Banking Trojan Can Steal 2FA Codes
A new Android banking Trojan called Nexus has been discovered, which has already been utilized by several cybercriminals to target approximately 450 financial apps and engage in fraudulent activities. Cleafy, an... Read more
Reliablepcsearch.com Shows Fake Virus Warnings
Upon examining reliablepcsearch.com, we have discovered that the website propagates a scam claiming your system is infected with viruses and urges visitors to allow suspicious notifications. It's crucial to comprehend... Read more
Gotyousearch.com Produces Fake Results Pages
Our recent examination of gotyousearch.com has revealed that it is an untrustworthy search engine that often delivers questionable search results. Such search engines are frequently advertised through browser... Read more
CommonMagic Used in Attacks Against Ukraine
During the ongoing conflict between Russia and Ukraine, various government, agriculture, and transportation organizations located in Donetsk, Lugansk, and Crimea have been targeted by a new modular framework called... Read more
Jypo Ransomware Will Lock Your Files & Demand Payment To Get Them Back
Jypo is a type of ransomware that uses encryption to prevent victims from accessing their data, while also renaming files by appending its extension (".jypo") to the filenames. The ransomware is accompanied by a... Read more
Authenticpcedge.com Uses Fake Scares To Push Ads
Our researchers discovered Authenticpcedge.com while investigating suspicious sites. It is a rogue page that aims to promote deceptive content and push browser notification spam, and it can redirect visitors to other... Read more
Rans-A Ransomware is an Xorist Variant Seeking Files for Encryption
During our analysis of malware samples, our team has identified a new type of ransomware known as Rans-A, which belongs to the Xorist family. This ransomware functions by encrypting files and then adding the extension... Read more
What does the 'Airplanes - New Tab' Rogue Browser Extension do?
During a routine check of suspicious websites, our researchers uncovered a browser extension called Airplanes - New Tab, which promises airplane-themed backgrounds for browsers. However, our analysis revealed that... Read more
Beware of 'Apple iPhone 14 Winner' Pop-Up Scam
Deceptive websites are promoting a scam called "Apple iPhone 14 Winner," which comes in various forms. These scams lure users with the promise of winning or receiving an iPhone 14. However, it is important to note... Read more
PowerMagic is Part of a Malware Framework Used Against Ukraine
In the midst of the ongoing conflict between Russia and Ukraine, several organizations operating in Donetsk, Lugansk, and Crimea have been targeted by a new modular framework known as CommonMagic, as part of an active... Read more
Beach Browser Hijacks Browser Settings
Upon our investigation of Beach Browser, we found that it is a browser extension that promotes a dubious search engine called search.beach-browser.com. Beach Browser accomplishes this by taking over the user's web... Read more
How to Avoid Linkforcaptcha.top Ads
While investigating websites that use malicious advertising networks, we came across linkforcaptcha.top. This particular site uses a clickbait tactic to trick visitors into giving consent for notifications.... Read more
HelperFormat Displays Potentially Harmful Ads
After examining the HelperFormat application, our team has determined that it falls under the category of adware due to its tendency to generate advertisements. We discovered HelperFormat while analyzing fraudulent... Read more
Yourshields24.com Abuses Notifications to Spam Ads
During our investigation of yourshields24.com, our team discovered that the website displays misleading messages that suggest a visitor's Android device may be infected with viruses or malware, and offers a complete... Read more
NAPLISTENER Malware Linked to APT Known as REF2924, Targeting Systems to Comprimise
The group known as REF2924 has recently been detected using a new type of malware, which has been named NAPLISTENER by Elastic Security Labs. The malware is an HTTP listener created using C# and is designed to evade... Read more