Newlocker Ransomware Joins Family of MedusaLocker Clones
During our inspection of malware samples, we discovered Newlocker, a ransomware program that is part of the MedusaLocker family. The ransomware encrypts files and adds the ".newlocker" extension to their names. It... Read more
RoarBAT Malware Spotted by Ukrainian CERT
The Computer Emergency Response Team of Ukraine (CERT-UA) has reported an ongoing phishing campaign that uses invoice-themed lures to spread the SmokeLoader malware. The emails are sent from compromised accounts and... Read more
What is the Conditioner Rogue Browser Extension?
The rogue Conditioner browser extension injects unwanted ads and redirects your browser search queries through dubious search engines. Once the extension is installed on a computer, it causes various issues, such as... Read more
Auto Refresh Rogue Browser Extension Acts as Adware
During our investigation of suspicious websites, our researchers stumbled upon the Auto Refresh browser extension which is supposed to refresh web pages automatically within a specified time frame. However, upon... Read more
'Request To Delete Your Email' Scam Phishes for Login Credentials
Upon conducting an examination of the email named "Request To Delete Your Email," we have determined that it is a spam message. This deceptive email falsely claims that the recipient's mail account is at risk of being... Read more
Beware of Active Land Rogue Browser Extension
During our inspection of questionable websites, our team came across the Active Land browser extension, which is promoted as a convenient tool for sports-related content. However, upon further analysis, we discovered... Read more
FluHorse Mobile Malware Tagets Asian Victims
A novel email phishing campaign has targeted different industries in East Asian markets by disseminating a previously unknown type of Android malware named FluHorse that exploits the Flutter software development... Read more
What is the iStart New Tab Rogue Browser Extension?
Upon examination of the iStart New Tab browser extension, our researchers discovered that it functions as a browser hijacker, modifying the browser's settings to promote a fake search engine known as letsearches.com.... Read more
Gash Ransomware Uses Ransom Note Similar to Djvu
The discovery of the Gash ransomware was made by our team during a routine inspection of new malware samples. This harmful program belongs to the Djvu ransomware family. After testing the Gash ransomware on our... Read more
Beware of the Azurewebsites.net Pop-Up Scam
Microsoft Azure Web Sites is a legitimate web-hosting platform developed by Microsoft, which assigns a subdomain of azurewebsites.net to the URL of a website created through the platform. Although users can assign a... Read more
Beware of Bs.serving-sys.com Bad Redirects
If you notice that your browser keeps redirecting you to the Bs.serving-sys.com website, chances are that an unwanted browser extension or a harmful program has been installed on your device without your knowledge.... Read more
Oneadvupfordesign.com Uses Fake Bot Check to Spam Ads
The website Oneadvupfordesign.com is a fraudulent site that attempts to deceive users into subscribing to its push notifications. By doing so, the site can then deliver spam notifications directly to the user's... Read more