Top Security News

Beware: Cybercriminals Leveraging Coronavirus to Exploit Computer Users and Spread Malware It hasn't taken a lot of time for threat actors to realize the social engineering opportunity that the novel coronavirus (2019-nCoV) has presented them. The respiratory infection that originated in...
Infections Abound as Computer Malware Exploiting COVID-19 Coronavirus Spreads Rapidly Adding to Worldwide Hysteria There's no doubt that the Coronavirus has created a worldwide hysteria and pandemic from having a negative impact on many economies to pressing government officials to hold conferences addressing...
Hackers Exploiting Coronavirus Fears To Push Malware As the Covid-19 pandemic goes into full swing, we see increasing numbers of hackers and nation-state actors trying to exploit the global fears for their own gains, spreading malicious software...

Top Articles

WebDiscover Browser

WebDiscover Browser screenshot

WebDiscover Browser is an adware threat developed by a Canada-based company named WebDiscover Media. Once installed on a PC, the malicious app makes a series of unwanted changes to all browsers installed on the computer, leading to a deteriorating online surfing experience. WebDiscover replaces the default home pages and search engines of affected Internet browsers with its own WebDiscover Homepage and WebDiscover Search, respectively. Furthermore, the malicious app modifies the “new tab” settings so that the corrupted browsers launch the malware's own search portal page when the user opens a new tab. Chrome users may not even recognize WebDiscover as an unwanted program and think they...

Posted on July 3, 2015 in Browser Hijackers

CoronaVirus Ransomware

CoronaVirus Ransomware screenshot

The CoronaVirus Ransomware (also called CoronaVi2022 Ransomware) is a file-locker, which was released in the wild recently, and it seems that its author has opted to use the name of the Coronavirus (also known as COVID-19), which is a disease that is threatening users worldwide. Just like the disease it is named after, the CoronaVirus Ransomware also threatens users worldwide, but in a different way – it will try to encrypt their files, and also overwrite the contents of their drive's Master Boot Record (MBR). The latter operation may cause a lot of trouble, since the victims' computers will not load their operating system and, instead, they will display a copy of the CoronaVirus...

Posted on March 12, 2020 in Ransomware

Hackers Spreading Malware via Coronavirus Maps Online

Hackers Spreading Malware via Coronavirus Maps Online screenshot

The ongoing outbreak of the coronavirus is now disrupting business across the world, but apparently cybercriminals have no days off, since they're just as active as they were before the beginning of the outbreak. It appears they are now capitalizing on the fears of the people regarding the pandemic. It was back in January that the hackers started using the coronavirus threat as a focus of an email campaign that infected users with malware, and now they are expanding their operations to coronavirus outbreak maps that follow the number of infections and deaths across the world. Many organizations are feeling the pressure from these attacks, such as John Hopkins University who created...

Posted on March 11, 2020 in Computer Security

APT Attack Spreads Malware Using Coronavirus Theme

APT Attack Spreads Malware Using Coronavirus Theme screenshot

The APT (Advanced Persistent Threat) group was spotted sending out spear-phishing emails that allegedly have detailed information about COVID-19, a.k.a. Coronavirus, but instead, they infect the victims with a custom remote access Trojan (RAT). The group is using the coronavirus pandemic to infect unsuspecting victims with a previously unseen malware. The malware is dubbed 'Vicious Panda' by researchers, with the attackers using it in a campaign at the moment. Researchers managed to find two Rich Text Format (RTF) files that were targeting the Mongolian public sector during the outbreak. Once the files are open, a unique and custom-made remote access Trojan is executed. It develops a list...

Posted on March 16, 2020 in Computer Security

Top 5 Popular Cybercrimes: How You Can Easily Prevent Them

Over the course of the past few years, hackers and cybercrooks armed with sophisticated malware have stolen literally hundreds of millions of dollars from online banking accounts and individuals all over the world. We have said it many times before in recent articles, the days of robbing banks in person are gone and now it all takes place behind a screen of a computer connected to the Internet. The Internet can be the most useful tool in business, school or every-day life. At the same time, the Internet can make someone's life a living hell in the event that one becomes the next victim of a cybercrime. A large percentage of the world's population that uses computers over the Internet are aware of cybercrime and the consequences that they may face if they succumb to a cybercriminals' trap. Others who have no clue as to the dangers they...

Posted on October 12, 2010 in Computer Security

$1000 Walmart Gift Card Winner Fake Pop-up

$1000 Walmart Gift Card Winner Fake Pop-up screenshot

Do Not Be Fooled by the '$1000 Walmart Gift Card Winner' Fake Pop-Up The '$1000 Walmart Gift Card Winner' fake pop-up is a pop-up window that is part of a common online scam. Criminals take advantage of inexperienced computer users by displaying misleading advertisements and pop-up windows in an attempt to lead them to attack websites or to convince them to disclose their online account or credit card information. The '$1000 Walmart Gift Card Winner' fake pop-up works by displaying a window with the Walmart logo and colors, claiming that the computer user has won a $1000 USD gift card for Walmart. However, clicking on this window leads the victim to an attack website which will attempt to...

Posted on January 24, 2012 in Fake Error Messages

AntiMalware

AntiMalware screenshot

A typical deceptive campaign is disguising harmful threats as legitimate security programs in order to steal money from inexperienced victims. AntiMalware is a particularly short-named version of this campaign, with clones with names such as Active Security and Total Security. AntiMalware uses an interface that is very similar to the Windows Defender and legitimate Microsoft security programs, to make the victim believe that AntiMalware is a legitimate anti-malware application. Observing AntiMalware's design, you will quickly spot authentic-looking Windows and Microsoft Security Essentials logos as well as a layout that may seem familiar to most users of legitimate Microsoft Security...

Posted on November 9, 2009 in Rogue Anti-Spyware Program

Beware of Fake Walt Disney World Facebook Pages Offering Chances to Win a Free Vacation

Astonishingly, it is nothing new to discover that cybercrooks have setup some fake page using a legitimate and well-known entity to trick computer users into getting something that seems too good to be true. In the latest scheme of things cyerbcrooks have created several fake Walt Disney World pages on Facebook that attempt to offer chances for winning tickets if they share and like some of the posts. Facebook is a playground for cybercriminals and it does not take much effort on a criminal's part to setup a fake page offering enticing deals for computer users, which in reality spread an aggressive scam. One of the current scams involves fake Walt Disney World pages that claim to give you and 50 other people a chance to win an all-paid-for Florida Disney World vacation. The deal does sound rather interesting and could very well be...

Posted on March 20, 2014 in Computer Security

'National Consumer Center' Pop-Ups

'National Consumer Center' Pop-Ups screenshot

The 'National Consumer Center' pop-ups are connected to known online tactics. According to complaints, the 'National Consumer Center' pop-ups may claim that the computer user has won a free iPhone or some other similar costly prize. The 'National Consumer Center' pop-ups may include the legend 'National Consumer Center' in the upper left corner, with an official looking font, and advertisements on the right. These pop-ups are among the most common online tactics and may be used to intrude on the computer user's privacy. The 'National Consumer Center' pop-ups may be caused by adware components installed on the affected Web browser. However, the 'National Consumer Center' pop-ups also may...

Posted on April 28, 2016 in Browser Hijackers

More Articles

Pushisback.com

The Pushisback.com is a dodgy website, whose only goal is to hijack the Web browser notifications of its visitors. This is known as the ‘Please Press Allow to Continue’ online tactic. The Pushisback.com website is affiliated with another fake website that partakes in the same low-level online tactic – ‘Pushishere.com.’ The users who try to view the content on the Pushisback.com site will be required to follow the page’s instructions. The Pushisback.com website will display a prompt that asks the users to click on the ‘Allow’ button to access the site’s content. However, the Pushisback.com page does not host any content, and if you comply with the site’s instructions, you will give it permission to send you push-notifications via your Web browser. The Pushisback.com website will use this permission to spam you with unwanted...

Posted on April 6, 2020 in Browser Hijackers

Ciledhoopinga.info

The Ciledhoopinga.info site is not a website you should visit. This is nothing more than yet another empty page that partakes in the ‘Please Press Allow to Continue’ online tactic. Many operators of fake sites use this low-level online con to hijack their visitors’ Web browser notifications. The Ciledhoopinga.info would ask the users to click on the ‘Allow’ button on their screen to get access to the page’s content. Unfortunately, instead of granting you access to exciting content, clicking the ‘Allow’ button will permit the Ciledhoopinga.info site to send you notifications via your Web browser. This may not seem like a big issue because many genuine websites ask users to permit Web browser notifications. However, the Ciledhoopinga.info page will not use the permission mindfully and will flood its users with advertisements via the...

Posted on April 6, 2020 in Browser Hijackers

Hesterinoc.info

If you browse low-quality, dodgy websites constantly, you may come across the Hesterinoc.info. This is a fake, empty website, which does not host any meaningful content. The Hesterinoc.info website partakes in the so-called ‘Please Press Allow to Continue’ online con. This is a low-level tactic whose goal is to trick users into providing dodgy sites the permission to display Web browser notifications. The Hesterinoc.info is likely to ask its visitors to prove that they are not a robot by completing a fake CAPTCHA test. The users are asked to click on the ‘Allow’ button to prove that they are human. However, the users who comply with the site’s demands would enable it to send push-notifications via their Web browser. This is not only annoying, as the advertisements will pester you at all times, but also not safe because the...

Posted on April 6, 2020 in Browser Hijackers, Mac Malware

Alcreasalcon.info

Alcreasalcon.info is a dubious website that is not hosting any exciting content. However, it is likely that this dodgy site is claiming to host interesting content that would attract the attention of users. Users who try to view the content that the Alcreasalcon.info site claims to host would be invited to click on the ‘Allow’ button they are presented with. The Alcreasalcon.info page claims that unless the user complies with its instructions, they will not be granted access to the website. This a scheme known as the ‘Please Press Allow to Continue.’ Many dodgy websites partake in it to generate cash. The users who follow the Alcreasalcon.info site’s instructions would permit it to send notifications via their Web browser. The Alcreasalcon.info page will use this permission to flood the user with unwanted and irrelevant advertisements....

Posted on April 6, 2020 in Browser Hijackers

Sbroughhig.info

The Sbroughhig.info website is not an interesting or engaging website. This is a fake page that may claim to host exciting content. However, these claims are not true. The Sbroughhig.info has one goal only – to hijack your Web browser notifications. Many dodgy websites like the Sbroughhig.info take part in this low-level online tactic. This con also is known as ‘Please Press Allow to Continue.’ Users may be presented with a prompt as soon as they open the Sbroughhig.info site. The prompt will require them to click on the ‘Allow’ button to access the content of the dodgy site. However, if you click on the button as instructed, you will permit the fake site to send you push-notifications via your Web browser. The operators of the Sbroughhig.info site generate cash by bombarding users with unwanted advertisements via their browser’s...

Posted on April 6, 2020 in Browser Hijackers, Mac Malware

Mxss.xyz

The Mxss.xyz domain hosts a basic search engine. The search engine in question is based on QIP. The Mxss.xyz site is not taking part in any illicit activities, and it is safe for use. However, malware researchers have linked the Mxss.xyz website with the activity of PUPs (Potentially Unwanted Programs). If the Mxss.xyz website is set as your default new tab page, you may have installed a PUP on your computer. It is likely that you may have installed a dodgy Web browser extension, which has tampered with your system’s settings automatically. This is typical PUP behavior. Despite the Mxss.xyz being a safe website, it is not likely that it will deliver the organic results of your search queries. This is because it may push sponsored results at the top of the page instead of the most relevant content. If you do not want the Mxss.xyz site...

Posted on April 6, 2020 in Browser Hijackers

InteractiveSpeed

The InteractiveSpeed application is a Mac utility that may present itself as a tool that may increase the system’s productivity or boost the user’s browsing experience. However, the InteractiveSpeed application is an adware program that is likely to impact your browsing experience negatively. The InteractiveSpeed utility is likely distributed via freeware bundles. Some users rush through the installation process and do not pay attention to what they agree to install. This is how adware often finds its way in users’ computers. Adware can prove to be very annoying, as its function is to inject advertisements on the websites that you visit. The advertisements may vary in shape and form. Users who have the InteractiveSpeed adware program on their Macs report that they would be displayed with large banners, flashing pop-up windows, various...

Posted on April 6, 2020 in Mac Malware

Jope Ransomware

The STOP Ransomware was the most active ransomware family of 2019, with over 200 copies detected by malware analysts. Many authors of ransomware threats opt to use the code of already existing threats instead of creating a data-locking Trojan from scratch as it requires more skills and is far more time-consuming.This is the case of the Jope Ransomware, which is a variant of the notorious STOP Ransomware. Propagation and Encryption The Jope Ransomware may be propagated with the help of fake emails. Many authors of ransomware opt to distribute their creations via phishing email campaigns that contain a corrupted attachment. Users who believe the tricks of the cyber crooks and open the corrupted attached file would infect their computers. Illicit, pirated software, malvertising, torrent trackers are among other commonly used infection...

Posted on April 6, 2020 in Ransomware

Kinsing

Some cyber crooks scan the Web looking for unsecured servers to exploit them in various manners. This is the case with the creators of the Kinsing malware. This is a Trojan miner that is designed to target servers that are not secured properly. Malware analysts have spotted countless Docker servers whose operators have failed to secure them – the login credentials used were the default ones. In other cases, the servers in question were not protected by a password at all. Such servers are ripe for the taking by various cybercriminals. The cyber crooks who launched the Kinsing campaign were scanning for unsecured or poorly secured Docker servers like the ones we mentioned. Cybersecurity researchers first spotted the Kinsing Trojan in 2019. However, the operators of this campaign are still active. The number of infected hosts has been on...

Posted on April 6, 2020 in Malware

Hackers Hijack 30 YouTube Accounts And Impersonate Bill Gates In Ponzi Scheme

Hackers Hijack 30 YouTube Accounts And Impersonate Bill Gates In Ponzi Scheme screenshot

One of the most popular types of scams that leverage cryptocurrencies as a method of collecting funds from victims is Ponzi schemes that impersonate famous people or companies from the tech industry. This type of scam was first popularized on Twitter, where cyber-crooks impersonated the likes of US President Donald Trump, Tesla's founder and CEO Elon Musk, and cryptocurrency figures like the creator of Ethereum, Vitalik Buterin. After Twitter started to crack down on users posing as verified accounts, however, many of these scams moved to YouTube. Recently, hackers hijacked more than 30 YouTube accounts in an elaborate scam that impersonated Microsoft CEO, Bill Gates. They were all...

Posted on April 6, 2020 in Computer Security

GuLoader

The GuLoader threat is an interesting mix of a loader, which can inject various threats on the compromised host and a regular Trojan downloader. This sophisticated tool appears to be utilized by various cybercriminals and hacking groups. According to reports, the GuLoader threat has been used to plant cryptocurrency miners, RATs (Remote Access Trojans), backdoor Trojans and other threatening malware. In the most recent campaigns, the GuLoader malware was used to inject the Parallax RAT and the Remcos RAT in the compromised hosts. The infection vector most commonly used for the spreading of the GuLoader malware is phishing emails. Usually, the targeted user would receive an email that appears to originate from a legitimate source. These fake emails often contain an attached file that is designed to look important – CV, invoice,...

Posted on April 3, 2020 in Ransomware

Mandrake

There is a new high-end campaign targeting Android users located in Australia with a tool called Mandrake. Of course, the cyber crooks behind the Mandrake hacking tool may choose to change their focus and target users from a different location in future campaigns. The Mandrake malware first emerged in 2016. Ever since malware analysts spotted the Mandrake threat, its creators have been introducing regular updates. The creators of the Mandrake threat have added new features, optimized old ones, removed unnecessary modules, and overall improved the hacking tool to ensure it remains very potent. The Mandrake malware can be distributed to thousands upon thousands of users easily. However, its operators are not taking the mass-spam approach. Instead, they appear to pick their targets carefully. There are only about 500 copies active...

Posted on April 3, 2020 in Spyware

WANNACASH NCOV Ransomware

The WANNACASH NCOV Ransomware is a brand-new data-locking Trojan that was spotted by malware researchers. Like many other cybercriminals, the creators of the WANNACASH NCOV Ransomware have opted to exploit the Coronavirus outbreak that is sweeping the world to generate some cash for themselves. We have seen a massive increase in fraudulent websites, online tactics, and various malware since the COVID-19 pandemic started making headlines worldwide. Countless cyber crooks are using this crisis to benefit, and the creators of the WANNACASH NCOV Ransomware are a great example. Propagation and Encryption The WANNACASH NCOV Ransomware is likely being spread with the help of bogus emails that contain corrupted attachments. This is a trick utilized by many authors of ransomware threats. Another commonly utilized technique is software...

Posted on April 3, 2020 in Ransomware

Jest Ransomware

Malware analysts have spotted a new data-encrypting Trojan targeting users online. This new Trojan has been dubbed the Jest Ransomware. Ransomware is very popular in the world of cybercrime since even less-experienced cyber crooks can create and distribute them with the help of ransomware building kits and similar tools. Propagation and Encryption Authors of ransomware threats like the Jest Ransomware use various techniques to distribute their creations. Some of the most popular ones include malvertising operations, pirated applications, torrent trackers, bogus software downloads and updates, mass spam email campaigns, etc. Some cyber crooks may even opt to use a combination of distribution methods to propagate these threatening file-encrypting Trojans. To harm the infected host as much as it can, the Jest Ransomware is likely capable...

Posted on April 3, 2020 in Ransomware

AresLookup

The AresLookup utility is a tool designed to target Mac computers. At first glance, this application may seem like a tool that would help enhance one's search results. However, this is not the case most certainly, as malware researchers have classified the AresLookup utility as adware. Many adware programs compromise user's systems by masking themselves as an application update that needs to be applied or an application download. In the case of the AresLookup adware program, the user is presented with a window titled 'Flash Player Installer' that urges them to install the application. Some adware utilities are bundled up with useful free applications. If the users try to install the application they were interested in and fail to pay attention during the installation process initially, they are likely to agree to install adware...

Posted on April 3, 2020 in Mac Malware
1 2 3 4 5 6 7 8 9 10 11 1,419