Museum Views Tab Rogue Browser Extension
During our investigation of suspicious websites, our research team came across the Museum Views Tab browser extension. After conducting a thorough analysis, we concluded that this extension is a browser hijacker. Its... Read more
Unsoning.com Disguises Ad Spam as Fake Bot Check
Based on our evaluation, it has been determined that unsoning.com utilizes deceptive tactics, including the display of fraudulent messages, in order to trick visitors into subscribing to notifications. Additionally,... Read more
COSMICENERGY Malware Targets Industries
A recently discovered strain of malicious software has been uncovered, specifically designed to infiltrate and disrupt critical systems within industrial environments. Referred to as COSMICENERGY by Mandiant, a threat... Read more
Vatq Ransomware Seeks Files to Encrypt Causing System Damage
During our examination of new malware sample, our team made a discovery involving the Vatq ransomware, which belongs to the Djvu ransomware family. Once a computer is infected, Vatq proceeds to encrypt files and... Read more
Browser Cleaner Pro Rogue Browser Extension Warrants Removal
Browser Cleaner Pro is promoted as a powerful tool specifically designed to efficiently eliminate browsing data and cookies. However, during our evaluation of this browser extension, our team discovered that it... Read more
Theronadforyou24.com Baits Visitors with Fake Anti-Bot Check
During our routine inspection of suspicious websites, we came across Theronadforyou24.com, a deceptive webpage. This webpage is specifically designed to generate spam browser notifications and redirect visitors to... Read more
EXISC Ransomware Targets Corporations and Businesses
During our investigation of new submissions on the VirusTotal site, we came across a ransomware program called EXISC. Its primary purpose is to encrypt data and demand payment in exchange for decrypting it. Upon... Read more
8Base Ransomware Locks Victims' Files
8base Ransomware is classified as a type of ransomware that encrypts data. When a computer becomes infected with 8base Ransomware, all files on the compromised system, including .xtml, .doc, .png, .pdf, .asp, and... Read more
Plantastic Tab Rogue Browser Extension
During a routine investigation of deceptive websites, our research team came across the Plantastic Tab browser extension. Our analysis revealed that this extension operates by modifying browser settings to promote the... Read more
Buhti Ransomware Aims for Victims Running Both Windows and Linux
Buhti is a type of ransomware that targets both Windows and Linux systems. While the Buhti ransomware payload primarily focuses on Windows computers and is a variant of the previously leaked LockBit 3.0 ransomware... Read more
Moneybird Ransomware Used in Attacks on Israeli Entities
Agrius, an Iranian hacking group also known as Pink Sandstorm and formerly Americium, has developed a new type of ransomware called Moneybird. CheckPoint researchers discovered this dangerous malware, which signifies... Read more
Knuckledzone.com Tries to Spam You With Ads
During our investigation into web pages associated with suspicious advertising networks, we encountered knuckledzone.com and determined it to be an untrustworthy website that employs a clickbait strategy to deceive... Read more