'Your Security Is Not Up-To-Date' Pop-Up Scam
While conducting investigations into misleading websites, our research team stumbled upon a technical support scam called "Your Security Is Not Up-To-Date." This scam operates by making deceptive claims about the... Read more
Itqw Ransomware Demands Initial Ransom of $490
While analyzing newly submitted malware samples, we came across a type of ransomware known as Itqw. This malicious software is responsible for encrypting files and altering their names by appending the ".itqw"... Read more
Google Safe Browser Total Protection Pop-Up Scam
While examining deceptive websites, our team came across the "Google Safe Browser Total Protection" scam. This fraudulent scheme masquerades as a browser security tool from Google, purportedly capable of identifying... Read more
Searchtabs.io Comes With Persistence Mechanism
Searchtabs.io is the URL of a counterfeit search engine. While examining suspicious websites, our team stumbled upon a deceptive webpage that used explicit content to entice users into downloading an installation... Read more
Hjutm Ransomware Displays Ransom Note Written in Russian
Hjutm is a type of ransomware from the Xorist family, and it was discovered during an analysis of malicious file samples. Hjutm is specifically designed to encrypt files, alter their filenames by adding the ".hjutm"... Read more
Searches-world.com Promotes Browser Hijacker
While investigating fraudulent websites, our researchers came across an installer that contained a browser hijacker promoting the fake search engine searches-world.com. Typically, browser-hijacking software endorses... Read more
Tab Clear Adware
While investigating suspicious websites, our researchers stumbled upon the Tab Clear browser extension. This extension is marketed as a tool that can close all types of browser tabs with a single click. Upon our... Read more
Rain or Shine Rogue Browser Extension
Rain or Shine falls into the category of browser hijackers because of its ability to alter critical browser settings, such as the homepage, new tab address, and default search engine. Users may also encounter an... Read more
Ithh Ransomware Uses Djvu Codebase
While examining new malware samples, we stumbled upon a ransomware variant known as Ithh. This ransomware is responsible for encrypting files and adjusting their file names by affixing the ".ithh" extension.... Read more
Horizon Timez Browser Extension
While investigating deceptive websites, our research team came across the Horizon Timez browser extension, which claims to offer "video-themed" browser wallpapers. Upon scrutinizing this software, we concluded that it... Read more
Nightnitroglass.com Shows Fake Anti-Bot Captcha
During the examination of nightnitroglass.com, it has come to our attention that the website's primary intent is to trick visitors into granting it permission to send notifications. To achieve this,... Read more
Keylock Ransomware Uses Lengthy Ransom Note
Our researchers identified Keylock as a type of ransomware program during a regular examination of new file submissions. Ransomware functions by encrypting files and then demanding payment for their decryption. On our... Read more