Dragon Angel Browser Extension
We found that Dragon Angel functions as a browser hijacker with the intention of endorsing a counterfeit search engine by modifying browser settings. Additionally, Dragon Angel may have the capability to gather... Read more
AceCryptor Malware Use Surges in Europe
Thousands of fresh infections linked to the AceCryptor tool — which enables hackers to conceal malware and infiltrate systems undetected by antivirus software — have been uncovered in a concerted effort targeting... Read more
Account Shutdown Notification Email Scam
After analyzing the email in question, it turned out to be a fraudulent message commonly known as a phishing scam, orchestrated by malicious individuals. Their main goal is to trick recipients into revealing personal... Read more
Dragon Search Solutions Browser Extension
We discovered that Dragon Search Solutions operates as a browser hijacker, primarily aiming to endorse a counterfeit search engine by altering the settings of the affected browser. Furthermore, Dragon Search Solutions... Read more
Vook Ransomware Encrypts Drives
Vook is a variant within the Djvu ransomware lineage. Vook functions by encrypting files and altering their filenames, appending the ".vook" extension. For instance, it transforms "1.jpg" into "1.jpg.vook", "2.png"... Read more
News-lifume.com Attempts to Spam You With Ads
After analysis, it has been determined that news-lifume.com utilizes clickbait, a deceptive strategy, to trick visitors into granting permission to receive notifications. Additionally, news-lifume.com has the ability... Read more
Nevofex.com Scam
Nevofex.com is a fraudulent website designed by scammers with the aim of tricking unsuspecting individuals into transferring cryptocurrency and potentially revealing personal information. Websites like nevofex.com... Read more
Searchingdb.com Triggers Bad Redirects
Searchingdb.com serves as an intermediary within redirection chains employed by browser hijackers. Consequently, if users encounter redirects to and from searchingdb.com, it is probable that an unreliable extension... Read more
FORCE Ransomware Will Hold Your Files Captive
Our team of researchers came across the FORCE ransomware variant while conducting a routine examination of new file samples. FORCE belongs to the Phobos ransomware lineage. During testing on our experimental system,... Read more
Unciorks.co.in Attempts to Spam Ads
The website Unciorks.co.in is considered untrustworthy, created by individuals with the intention of exploiting users' trust for personal gain. It employs deceptive tactics to persuade users into allowing push... Read more
Vast-conexxion.com Pushes Intrusive Ad Spam
While exploring suspicious websites, our research team came across the rogue webpage vast-conexxion.com. This site promotes questionable content and inundates users with browser notification spam. Moreover,... Read more
Looy Ransomware Locks Most Files
Looy has been identified as a variant within the Djvu ransomware family. Looy operates by encrypting files and adjusting their filenames, adding the ".looy" extension. For example, it changes "1.jpg" to "1.jpg.looy",... Read more