Sync.1rx.io - A Potentially Unwanted Program that Causes Redirects
It is possible that your device has a rogue browser extension or a potentially unwanted program installed if your browser is repeatedly redirected to the Sync.1rx.io site. Sync.1rx.io is a website that displays ads... Read more
What is the DarkBit Ransomware?
While investigating new malware strains, our team came across DarkBit - a ransomware that operates by encrypting data and demanding ransoms for decryption. Upon launching a sample of DarkBit, it immediately begins... Read more
How to Avoid Odestech.com Ads
Odestech.com is a website that misleads people into allowing it to send notifications. People usually arrive at these pages accidentally. Our team came across this site when researching pages that use suspicious or... Read more
What Does Indignationmapprohibited.com Browser Hijacker Do?
If your browser is constantly being taken to Indignationmapprohibited.com, you may have some unwanted programs on your device. This website attempts to redirect your browser towards ads for chrome extensions, surveys,... Read more
What is the Proxima Ransomware Threat?
Proxima is a ransomware program that encrypts data and appends the filenames with a ".proxima" extension. After Proxima is deployed on a victim system, it drops a ransom-demanding message – "Proxima_Readme.txt" – onto... Read more
MortalKombat Ransomware Has Ties to Xorist to Steal Cryptocurrency
Starting from December 2022, researchers with Cisco Talos have been monitoring an unknown entity that has been using two pieces of recently discovered malicious software - MortalKombat ransomware and a GO variant of... Read more
Watch Out for Searchresultsquickly.com Browser Hijacker Fraud
Searchresultsquickly.com is a fraudulent search engine that operates by displaying misleading content. Such search engines are known for collecting user information, and although searchresultsquickly.com provides... Read more
M2RAT Malware Hides in Doctored Images with Malicious Payload
The RedEyes Hacking Group, also known as APT37, is a threat group that has been engaging in cyber espionage activities. Recently, they have adopted a new tactic to collect intelligence from targeted individuals by... Read more
Hhoo Ransomware Joins Host of Djvu Clones Targeting Files for Encryption
Our team discovered a new variant of ransomware belonging to the Djvu family called Hhoo while analyzing malware samples submitted to online threat analysis databases. Hhoo encrypts files and modifies the filenames by... Read more
Beware of the Top10answers.com Browser Hijacker
If you've seen Top10answers.com or another URL hijacking your web browser, such as Chrome, Firefox, or Edge, then it is likely that a potentially unwanted program has made its way on your system. Potentially unwanted... Read more
How to Stop CaptchaCoolNow Bad Redirects
CaptchaCoolNow.Top is a malicious website that tries to trick people into subscribing to its push notifications so it can send spam directly to their devices. It does this by showing fake error messages and alerts,... Read more
Mikel Ransomware is a Proxima Clone That Targets Various File Types
Mikel is a type of ransomware that encrypts data and demands payment in exchange for its release. The new variant belongs to the Proxima family. The Mikel ransomware appends files with the ".mikel" extension. A ransom... Read more