Top Security News

Top 5 Popular Cybercrimes: How You Can Easily Prevent Them Over the course of the past few years, hackers and cybercrooks armed with sophisticated malware have stolen literally hundreds of millions of dollars from online banking accounts and individuals all over the world. We have said it many times before in recent articles, the days of robbing banks in...
Fake Windows Support Calls Seek to Scam and Infect Computer Users with Malware Fake phone calls from crooks on the other end claiming to be a support team from a well-known entity is an increasing pandemic, which has claimed an alarming rate of victims in the recent weeks. There have been a large number of phone calls received by computer users in various countries from...
Spam Alert: Phishing Email Scam Titled 'Bank of America Alert: Account Suspended' We recently discovered a new phishing scam from a Bank of America spam email message that attempts to warn a computer user of an 'invalid login' resulting in a 'suspended banking account'. The spam message is ultimately a phishing scam that tries to lure computer users to a phishing site to...

Top Articles

LockerGoga Ransomware

LockerGoga Ransomware screenshot

While security researchers have expected ransomware attacks to slow down in 2019, recent ransomware outbreaks remind us that we must remain ever vigilant. One such outbreak that made headlines involved a ransomware known as LockerGoga. The ransomware targeted Norwegian manufacturing company Norsk Hydro, one of the world's top aluminum producers, forcing it to halt operations in multiple factories. This severely hindered the company's production and caused its stocks to fall by 0.8 percent. It is also suspected that a variant of LockerGoga was used to target French engineering company Altran Technologies earlier in January. Ransomware is a type of malware that encrypts the files of a...

Posted on March 31, 2019 in Ransomware

'National Consumer Center' Pop-Ups

'National Consumer Center' Pop-Ups screenshot

The 'National Consumer Center' pop-ups are connected to known online tactics. According to complaints, the 'National Consumer Center' pop-ups may claim that the computer user has won a free iPhone or some other similar costly prize. The 'National Consumer Center' pop-ups may include the legend 'National Consumer Center' in the upper left corner, with an official looking font, and advertisements on the right. These pop-ups are among the most common online tactics and may be used to intrude on the computer user's privacy. The 'National Consumer Center' pop-ups may be caused by adware components installed on the affected Web browser. However, the 'National Consumer Center' pop-ups also may...

Posted on April 28, 2016 in Browser Hijackers

Movies123 Ads

Movies123 Ads screenshot

People who do not like paying for legal streaming services often end up either looking to download the media they are after illicitly or searching for Web pages that offer to stream pirated content for free. However, as it is said, there is no free lunch. Websites that host pirated media tend to work with a whole network of other dodgy actors. Mainly dubious advertisers who will try to sell you all sorts of shady products and subscriptions. A common trick used by dodgy websites like the Movies123 page is to try and trick the user into giving them permission to display browser notifications. Many legitimate websites ask for permission to send browser notifications, but their goal is to...

Posted on September 13, 2019 in Adware

More Articles

Dengelmeg.com

The Dengelmeg.com site is a page that would attempt to hijack your Web browser’s notifications to promote dodgy products and shady services. While Web browser notifications can be a useful tool if used the correct way, dubious websites only use them to bombard their visitors with unwanted and irrelevant advertisements. Promotes Dodgy Products and Shady Services Operators of dodgy pages like the Dengelmeg.com site tend to use a variety of tricks to get the user to allow them to display Web browser notifications. It would appear that the Dengelmeg.com site claims to host adult content as its visitors are asked to confirm their age. However, this is nothing more but a trick as clicking on the button that is meant to confirm your age will actually give the shady page permission to display browser notifications. It is far more likely for...

Posted on January 24, 2020 in Browser Hijackers

Seriorladded.info

There are countless shady websites online that do not host any valuable content and whose main goal is to promote dodgy products and bogus services. Among these dubious Web pages is the Seriorladded.info site. The operators of the Seriorladded.info generate revenue by hijacking their visitors' Web browser notifications and bombarding them with advertisements. Presents Visitors with a Bogus CAPTCHA To trick users into allowing the Seriorladded.info site to display Web browser notifications, the dodgy page would require them to click on the 'Allow' button that is supposedly going to confirm that they are not a robot. However, this is not a real CAPTCHA, and clicking on the 'Allow' button will enable the Seriorladded.info website to begin spamming the user with unwanted advertisements via their Web browser notifications feature. This is a...

Posted on January 24, 2020 in Browser Hijackers

Getmackeepersoftpro.xyz

The Getmackeepersoftpro.xyz Web page is a dodgy site whose purpose is to promote PUPs (Potentially Unwanted Programs) targeting Apple devices. Once a visitor launches the Getmackeepersoftpro.xyz page, the site will detect what device the user is utilizing. This website can determine the model and the brand of the user's system. The visitor will be greeted with a bogus pop-up window that advertises a VPN service for Mac computers. Alternatively, if the user is visiting the odgy site via their iPhone or iPad, they will be presented with a similar pop-up message promoting an application for their device. It is crucial for users to avoid downloading any software from shady or unconfirmed sources as the products they promote are not reliable and may end up harming your system. Promotes Dodgy VPN and Similar Services It would appear that...

Posted on January 24, 2020 in Browser Hijackers

Topi Ransomware

One of the newest copies of the STOP Ransomware is called the Topi Ransomware. The creators of the Topi Ransomware have borrowed the code of the notorious STOP Ransomware and altered it slightly to fit their needs. The STOP Ransomware family was the most active one throughout the entire 2019, with over 200 copies of the threat circulating the Web. Propagation and Encryption Authors of ransomware threats tend to use a variety of infection vectors to propagate these nasty Trojans. It is likely that the most popular propagation methods are spam email campaigns. The attackers would send the targeted user an email that contains a message riddled with social engineering tricks. The o of the fake message is to trick the user into opening the file attached to the email. Usually, the attached file is macro-laced, and launching it would...

Posted on January 24, 2020 in Ransomware

Reha Ransomware

The Reha Ransomware is among the most recently uncovered file-encrypting Trojans. Once spotted and dissected, this threat revealed that it is a variant of the infamous STOP Ransomware. During 2019 the STOP Ransomware family claimed countless victims as it emerged as the most active ransomware family throughout the entire year. The Reha Ransomware would compromise a user's PC, lock all their files, and then present them with a ransom note asking for cash in return for a decryption key. Propagation and Encryption Malware researchers have not yet identified with any certainty what is the infection vector responsible for the spreading of the Reha Ransomware. Some speculate that the authors of the Reha Ransomware may be utilizing spam emails containing macro-laced attachments. It is also likely that the attackers may be using malvertising...

Posted on January 24, 2020 in Ransomware

Beware: Fake FedEx Text Alerts and Emails Used in New Scam

Beware: Fake FedEx Text Alerts and Emails Used in New Scam screenshot

There is an awful lot of spam making the rounds, both in email and mobile text format. With an average of 300 billion emails being sent every day and the majority of those being spam that has unsolicited or malicious content, spam is a very serious issue. With so much of it going around, it is no wonder that there are bad actors out there who pretend they represent huge corporations and household names. FedEx happens to be among those names. In early 2020 there have been reports of mobile texts that claim the recipient has a package being delivered by FedEx, with a link in the text that is supposedly used to "set delivery preferences". The fake texts use that link to take the victim to a...

Posted on January 24, 2020 in Computer Security

OnyxLocker Ransomware

Malware analysts have uncovered yet another ransomware threat in the wild. This brand-new file-encrypting Trojan is called the OnyxLocker Ransomware. It is likely that the creators of this threat originate from the Russian Federation as the ransom note has versions in Russian and English. It appears that the OnyxLocker Ransomware does not belong to any of the popular ransomware families, and its creators may have built it from scratch. Propagation and Encryption The most commonly used infection vectors when it comes to the propagation of ransomware threats are spam emails containing infected attachments, torrent trackers, bogus application downloads and updates, pirated copies of popular software and media, etc. Like most threats of this type, the OnyxLocker Ransomware would make sure to encrypt all the data it can get its hands on to...

Posted on January 23, 2020 in Ransomware

Fbot

The Fbot botnet is a more recent variant of the infamous Mirai Botnet. The operators of the Fbot botnet peak their activity for a set period usually and then go quiet for several weeks. This is likely a tactic to avoid detection. The Fbot botnet is comprised of IoT (Internet-of-Things) devices running Linux-based OS. The devices targeted by the Fbot botnet tend to be smart gadgets and tools, routers, etc. In February 2019, malware researchers found that the Fbot botnet has managed to compromise and hijack more than 25,000 DVR/NVR devices around the globe. Used For DDoS Attacks Many operators of botnets opt to plant cryptocurrency miners on the hijacked devices that are then used for mining cryptocurrencies spending the computing power of the host without their owners’ knowledge. However, another very common, and more old-school...

Posted on January 23, 2020 in Botnets

Free Streaming Radio

The Free Streaming Radio is an application that presents itself as a useful tool for users who enjoy listening radio. The creators of the Free Streaming Radio application claim to provide users with radio streams online that will keep them entertained for hours. However, all the radio streams the Free Streaming Radio provides are available online freely. There is no need for users to install third-party applications like the Free Streaming Radio add-on to get content that is available for free one click away. After analyzing this application, cybersecurity experts have identified it as a PUP (Potentially Unwanted Program). Sets a New Tab Page PUPs like the Free Streaming Radio application are not inherently unsafe to your system and do not pose a threat to your data's security. However, PUPs do not provide any valuable content and are...

Posted on January 23, 2020 in Potentially Unwanted Programs

My Driving Directions

Users who browse dodgy sites like illicit streaming sites, shady dating platforms, adult content pages, etc. are likely to come across a variety of PUPs (Potentially Unwanted Programs). Among the most recently spotted PUPs is the My Driving Directions application. The authors of this application claim to provide users with helpful maps and navigation services. However, the My Driving Directions application does not offer any unique features to its users - all the tools and services offered are already available online freely. This means that users who want to take advantage of free navigation services do not need to install the My Driving Directions application or any other third-party program. Changes the User's New Tab Page If the users install the My Driving Directions application, they will notice that this add-on alters their Web...

Posted on January 23, 2020 in Potentially Unwanted Programs

Reliableultimatesafevideoplayers.info

The Reliableultimatesafevideoplayers.info website claims to host a 'reliable' and 'safe' video player free of charge that any user can download. However, this application is neither reliable nor safe, and it has been identified as unwanted and potentially harmful. The shady Reliableultimatesafevideoplayers.info site contains a few pages that appear to be hosting updates for the Adobe Flash Player – a very popular application that many users have installed on their systems. To make their website appear more legitimate, the operators of this shady page have chosen a domain name that is meant to look trustworthy. Despite the claims of the operators of the Reliableultimatesafevideoplayers.info website, rest assured that this page does not host any valuable content, and it is best for visitors to ignore the site's offers simply. Avoid...

Posted on January 22, 2020 in Browser Hijackers

Biggerupdateforvideos.best

Users who browse shady websites when they are looking for videos, especially, are likely to come across the Biggerupdateforvideos.best page. The creators of the Biggerupdateforvideos.best page have only one goal – to promote a fraudulent update for the Adobe Flash Player. Usually, to trick their visitors into applying the supposed update, dodgy websites like the Biggerupdateforvideos.best page would claim to host an engaging video that the users can only view if they update their Adobe Flash Player. It would seem that the admins of the Biggerupdateforvideos.best site are targeting Mac users mainly. Propagates Potentially Unwanted Programs Despite the claims of the authors of this shady Web page, the update they are offering is not legitimate, and it is likely that users who fall for this trick will install a PUP (Potentially Unwanted...

Posted on January 22, 2020 in Browser Hijackers

Vivin Botnet

Malware researchers have been keeping an eye on the activity of the Vivin Botnet since 2017 when this botnet first appeared on the map. The peak activity of the Vivin Botnet was around the end of 2018. Ever since, the operators of this botnet have been neglecting this campaign, and there has been a decreasing number of hijacked systems. The goal of the creators of the Vivin Botnet is to compromise unsuspecting users' systems and plant cryptocurrency miners on them. This would allow the operators of the Vivin Botnet to mine cryptocurrencies using up the computing resources of the users whose systems have been hijacked. Mines the Monero Cryptocurrency The mining module that the creators of the Vivin Botnet inject in the compromised systems is the publicly available XMRig cryptocurrency miner. The XMRig miner is designed to mine the...

Posted on January 22, 2020 in Botnets

16Shop

More and more cyber crooks are opting to use PayPal phishing pages to generate revenue off the backs of unsuspecting users. One of the most well-used tools for the creation of phishing pages is the 16Shop phishing kit. The authors of the 16Shop phishing kit are very experienced in the area. Cybersecurity analysts are familiar with the work of the hacking group behind the 16Shop phishing kit. Over the years, these cybercriminals have developed phishing pages mimicking commonly used online services such as American Express, Apple, and Amazon. The Creators of the 16Shop Kit Provide Their Clients with Many Perks The creators of the 16Shop phishing kit have decided to target PayPal in their latest campaign. The 16Shop kit can be used by shady individuals around the world as it is available in English and also in Spanish, German, Japanese,...

Posted on January 22, 2020 in Malware

Nosu Ransomware

Ransomware threats are one of the worst malware types a regular user can stumble upon. Threats of this class make sure to sneak into their target's system, locate the data of interest, and lock it securely using an encryption algorithm. The goal is to blackmail the users into paying a ransom fee in exchange for a decryption key that will help them recover their data. Among the most recent ransomware threats uncovered is the Nosu Ransomware. This data-encrypting Trojan belongs to the most active ransomware family of 2019 – the STOP Ransomware family. Propagation and Encryption It has not yet been uncovered how the attackers are propagating this ransomware threat. A majority of cyber crooks who distribute file-locking Trojans opt to rely on spam emails. This entails a fake message and a corrupted attachment being sent to the targeted...

Posted on January 21, 2020 in Ransomware
1 2 3 4 5 6 7 8 9 10 11 1,388