Computer Users Should Never Trust The DYDX NFT Airdrop Scam
The "DYDX NFT Airdrop" scam poses a significant threat to cryptocurrency users, leveraging the reputation of the dYdX decentralized exchange to deceive unsuspecting victims. Impersonation Tactics Unlike typical scams... Read more
SHINRA Ransomware Dangerously Encrypts Your Files
The SHINRA ransomware poses a severe threat to computer systems by encrypting files and demanding ransoms for decryption. Upon infection, it renames files with random character strings and adds a ".SHINRA3" extension,... Read more
Thenetaservices.com Displays Fake Anti-Bot Prompt
Thenetaservices.com is a deceptive website created to push browser notification spam and potentially redirect users to questionable or harmful sites. Our team identified thenetaservices.com during an examination of... Read more
Phoureel.com Shows Misleading Survey
Upon examining the questionable site phoureel.com, our research team discovered that it operates as a rogue webpage promoting browser notification spam and redirecting users to potentially unreliable or malicious... Read more
Muddling Meerkat APT Discovered Pulling DNS Tricks
A new cyber threat named Muddling Meerkat has been detected engaging in sophisticated activities involving the domain name system (DNS) since October 2019. This appears to be an attempt to evade security measures and... Read more
Why You Should Beware of the Invoice Request Email Scam
The "Invoice Request" email scam is a deceptive tactic employed by cybercriminals to steal personal information and credentials. These emails typically claim to be regarding a contract renewal and include an... Read more
Google Reports Blocking Over 2.2 Million Malicious Apps on the Play Store
In late April 2024, Google announced that enhancements to its security processes prevented 2.28 million privacy-violating apps from being published on its Google Play store in 2023. The company attributed this success... Read more
Robaj Ransomware Encrypts Majority of File Types
Upon reviewing new file samples, our team identified a new ransomware variant named Robaj. When executed in our testing environment, this malware encrypted files and generated a ransom note named "readme.txt" to... Read more
What is Shadow Ransomware?
Shadow ransomware is a perilous form of malware that encrypts files upon infiltration, adding the ".Shadow" extension to filenames, sometimes repeating it. For instance, a file named "1.jpg" would be changed to... Read more
Merlin Swap Airdrop Scam
Upon examination of the website mage-airdrop-merlinchain.com, we identified it as a deceptive site promoting a fraudulent cryptocurrency giveaway (airdrop). This scam website falsely presents itself as the top... Read more
Agreement Update Email Scam
The "Agreement Update" email is a form of phishing, posing as a notification about changes to terms of service. Its purpose is to trick recipients into visiting a phishing website designed to steal login credentials,... Read more
Tuborg Ransomware Will Lock Your System
Upon analyzing the malware, it became evident that Tuborg is ransomware, distinct from the Tuborg Brewery, designed to encrypt files. Besides encrypting files, Tuborg alters the desktop wallpaper and presents a ransom... Read more