Threat Scorecard

Ranking: 19,605
Threat Level: 20 % (Normal)
Infected Computers: 2
First Seen: October 20, 2023
Last Seen: October 24, 2023
OS(es) Affected: Windows

Upon conducting a thorough examination of, infosec experts were able to confirm that this website exhibits deceptive characteristics. Its primary objective is to mislead visitors into believing that their computers are under threat from infections or malware. Furthermore, the site actively seeks permission to display notifications on users' devices. Given these deceptive practices and manipulative intentions, it is strongly advised that should be approached with caution and not considered a trustworthy source.

Rogue SItes Like Rely Heavily on Misleading and Clickbait Tactics

Upon visiting, a series of deceptive actions unfold. The website initiates a fabricated system scan, followed by a phony warning pop-up message. This message, attributed to, asserts the presence of TROJAN 2023 and other unsafe software on the user's computer. The message is designed to induce a sense of urgency by outlining dire consequences, including potential data loss and the theft of sensitive information.

The fake warning goes a step further, recommending immediate action, such as the use of an antivirus solution to purportedly remove the detected threats. It is crucial to emphasize that this message is, in fact, a scam, deliberately crafted to appear as a legitimate security alert. Such deceptive messages are cunningly designed to dupe users into downloading intrusive or even malicious apps or purchasing unnecessary services, all while disguising these actions as protective measures for their computers against non-existent threats. has also been observed promoting legitimate security products. This affiliation suggests that the site operates through affiliates who aim to earn commissions by directing users to acquire specific applications.

In addition to the fake warnings, also requests permission to display notifications. While legitimate websites employ this feature for benign purposes, untrustworthy sites like frequently exploit it to deliver more fraudulent warnings, advertisements or misleading content. This tactic is part of their strategy to intensify manipulation efforts and exploit unsuspecting users.

Always Remember that Sites Cannot Perform Malware Scans of Visitors’ Devices

Websites cannot perform malware scans of visitors' devices for several fundamental reasons:

  • Security and Privacy Concerns: Scanning a visitor's device for malware without explicit consent is a significant invasion of privacy and a security risk. It could potentially access sensitive or personal information without the user's knowledge or permission, leading to privacy violations.
  •  Browser Limitations: Modern Web browsers operate within a security sandbox, which means they have strict limitations on accessing a user's device's files and settings for security reasons. These limitations prevent websites from directly scanning a user's device.
  •  Lack of Permissions: Websites do not have inherent permissions or the authority to access a user's device's file system and conduct scans. To access these areas, explicit permission is typically required from the user.
  •  Technical Constraints: Websites are essentially collections of files hosted on a server and delivered to a user's browser. They do not have the capabilities or infrastructure to run deep scans of a user's device, which would require advanced anti-malware software.
  •  Server-Side Limitations: While websites can perform various functions on the server side, they don't have direct access to the user's device. They can collect information submitted by the user (such as form data), but they can't directly inspect or scan a user's device for malware.
  •  Ethical and Legal Issues: Initiating malware scans without consent or attempting to access a user's device without explicit authorization is not only unethical but can also be illegal in many jurisdictions. Unauthorized access to a computer or device is a violation of privacy and computer crime laws.

In summary, websites are limited by technical, ethical, and legal constraints from performing malware scans on visitors' devices. Any legitimate malware scanning or protection should be initiated by the users themselves or through dedicated security software, with full consent and awareness of the process.

URLs may call the following URLs:


Most Viewed