Hyperliquid (HYPE) Airdrop Scam
Upon reviewing the claim-hyperliquid.xyz website, we discovered that it promotes a cryptocurrency airdrop; however, further investigation revealed that claim-hyperliquid.xyz is a fraudulent page posing as a legitimate... Read more
CVE-2024-3661 Vulnerability Exploited in TunnelVision Attack
Researchers have described a technique called TunnelVision, which allows threat actors to monitor network traffic of victims by leveraging the same local network. This bypass method, referred to as "decloaking," has... Read more
Your System Has Been Cracked Email Scam
Upon reviewing the "Your System Has Been Cracked" email, we identified it as spam promoting a sextortion scam. This deceptive email falsely alleges that the recipient's device was hacked by the sender, who claims to... Read more
Girlzsportteam.top Pushes Unwanted Ads
During an investigation of questionable websites, our researchers came across the girlzsportteam.top rogue page. Upon examination, we determined that this webpage prompts spam browser notifications and redirects users... Read more
ROOTROT Malware Used by Chinese Threat Actor
The MITRE Corporation has provided additional information about a recent cyber attack, revealing that the earliest signs of intrusion date back to December 31, 2023. This attack, disclosed last month, targeted MITRE's... Read more
Valorant Gift Scam Preys on Gamers
Upon investigation, it was determined that a website purporting to offer gifts for the Valorant video game is fraudulent. This scam falsely promises users one thousand Radianite points for free, operating as a... Read more
USDT NFT Airdrop Scam
After analyzing the website token-usdt.com, we identified it as a scam site that replicates tether.to with the intention of deceiving visitors into believing they can participate in an airdrop to receive free... Read more
Xam Ransomware Demands Payment in Tether Crypto
Our researchers discovered the Xam ransomware during an examination of new file samples. Ransomware is a form of malicious software that encrypts files to demand payment for their decryption. After obtaining a sample... Read more
EnigmaWave Ransomware Locks Infected Systems
EnigmaWave is a type of ransomware that functions by encrypting data, making it inaccessible, and then demanding payment for decryption. The ransomware program alters the filenames of encrypted files by appending the... Read more
DataUpdate Adware
During our examination of new file sample submissions, we came across the DataUpdate application. Upon analysis, we identified this application as adware, specifically belonging to the AdLoad malware family. Adware is... Read more
Hotsearch.io Hijacks Search Queries
Hotsearch.io is a counterfeit search engine accessed through the HotSearch browser extension, which functions as a browser hijacker. This extension alters browser settings to trigger redirects to the hotsearch.io... Read more
Qeza Ransomware Locks Infected Systems
Qeza is a type of ransomware belonging to the Djvu family. Ransomware is a type of malicious software that encrypts files and demands payment in exchange for decryption. Alongside encrypting files, Qeza appends the... Read more