Find Unclaimed Airdrops Scam
Our team found that this is a deceptive scheme masquerading as a platform that claims to assist in discovering cryptocurrency airdrops (free distribution of cryptocurrency tokens or coins). The primary aim of this... Read more
Apple Security Alert Scam
Apple might send security alerts to its users and those may be legitimate. For instance, alerts may be triggered if there's an attempt to access your iCloud account, if you visit an unsafe website, or if you're... Read more
Earndrop Scam
It has come to light that there is a fraudulent scheme related to cryptocurrency, strategically crafted to trick unsuspecting users into participating in a fake giveaway. The main objective pursued by the individuals... Read more
Dragon Honey Browser Extension
Following an examination by our team, it has been determined that Dragon Honey operates as a browser hijacker. Specifically, Dragon Honey modifies the settings within a web browser to endorse a counterfeit search... Read more
Mint Fun Giveaway Scam
This is a fraudulent scheme where scammers aim to trick unsuspecting individuals and steal their cryptocurrency. The culprits use a misleading giveaway scheme, promoted through posts on X (formerly known as Twitter)... Read more
Empire Ransomware Locks Victim Systems
In the course of reviewing new file samples, a ransomware known as Empire was identified. Empire employs encryption to hinder victims from accessing their files and adds the ".emp" extension to filenames. For... Read more
Crystalcraft.top Attempts to Mislead Visitors
Crystalcraft.top tricks users into activating push notifications, allowing the site to flood devices with disruptive ads. It employs deceptive tactics, using fake browser errors that prompt users to "Allow... Read more
Z912 Ransomware Provides No Contact Information
In a examination of new malware samples, a ransomware variant named Z912, based on Chaos, has been identified. Z912 employs encryption to block access to files and appends four random characters to filenames.... Read more
Shuriken Ransomware Will Encrypt Most Files
In the course of our examination of malicious samples, we came across a variant of ransomware identified as Shuriken. This specific type of ransomware not only encrypts files and modifies their names but also... Read more
Prime Stealer Malware
Prime, a malicious software, specializes in stealing sensitive information from Windows users. This crafty threat is adept at extracting a wide range of data, encompassing browser details, cryptocurrency information,... Read more
Outonixan.com Pushes Intrusive Advertisements
Outonixan.com is a deceptive website designed to compromise the online security of users. Its primary strategy involves deceiving users into believing that a website's push notification prompt is harmless, urging them... Read more
Beware: JinxLoader Malware Named After Video Game Character
A recently identified malware loader named JinxLoader, built on the Go programming language, is now being employed by threat actors to deliver subsequent malicious payloads such as Formbook and its successor XLoader.... Read more