Trojan:Win64/Reflo.HNS!MTB

We did a detailed analysis of Win64/Reflo.HNS!MTB and found the way to remove it

Win64/Reflo.HNS!MTB is a detection of a malware sample that aims at stealing confidential information. It usually spreads through game mods and works as quietly as possible. That virus may belong to any malware family, as it is a behavioral detection of a specific action that it does in the system. Win64/Reflo.HNS!MTB Overview Trojan:Win64/Reflo.HNS!MTB is a… Continue reading Trojan:Win64/Reflo.HNS!MTB

Altisik Service Virus

Here is a detailed analysis of the Altisik Service

Altisik Service is a malicious coin miner that usually installs and runs on the target system without the explicit consent of the PC owner. It disguises itself as a Windows service, which makes it difficult to stop or remove. Let’s have a closer look at how this malware operates and how to delete it from… Continue reading Altisik Service Virus

Can You Get a Virus By Visiting a Porn Site?

Is it possible to get malware from visiting a porn website? Here is our answer

Rumors and jokes about malware on porn websites have been circulating ever since such sites became popular among folks. It is a good call to a certain degree, as there were direct malware dangers in the past, and some are still present nowadays. Still, with the change of the overall malware landscape, these threats have… Continue reading Can You Get a Virus By Visiting a Porn Site?

Gh0st RAT Malware Attacks Chinese Users Via Fake Chrome Page

Chinese malware targets Chinese users - a rather unusual thing to see

Attackers are using a new loader, Gh0stGambit, to spread Gh0st RAT malware to Chinese users. A Google Chrome phishing download site is being used for that purpose, copying the design of the genuine page. That is, in fact, the part of the campaign that attracted the attention of cybersecurity experts. Gh0st RAT Trojan Targets Chinese… Continue reading Gh0st RAT Malware Attacks Chinese Users Via Fake Chrome Page

Trojan:BAT/PSRunner.VS!MSR

Detailed Analysis of the Trojan:BAT/PSRunner.VS!MSR detection

Trojan:BAT/PSRunner.VS!MSR is a detection of malware that executes malicious commands on a compromised system. It does not do much hurt by itself and rather serves for payload delivery & running. Aside from that, it does some basic system reconnaissance and gains persistence for the further payloads. Trojan:BAT/PSRunner.VS!MSR Overview Trojan:BAT/PSRunner.VS!MSR is a type of malware detection… Continue reading Trojan:BAT/PSRunner.VS!MSR

Jellyfish Loader Malware Discovered, Threatens 2024 Olympics

Analyzing the new threat Jellyfish Loader, that shares parts of its code with malware samples used in cyberattacks during 2018 Olympic Games

A new threat has been discovered in the form of a Windows shortcut that is actually a .NET-based shellcode downloader called Jellyfish Loader. It has some strange features that may signify that it is still at the development stage. Nonetheless, this malware is capable of deploying other malicious software in a selection of ways. Jellyfish… Continue reading Jellyfish Loader Malware Discovered, Threatens 2024 Olympics

AsyncRAT Spreads As Fake eBook Files, Uses LNK Files

Researchers discovered a new spreading tactic of AsyncRAT malware

Recent research uncovers a new spreading campaign of AsyncRAT, that targets users who download electronic books. The reviewed campaign targets ones who seek for a specific book, originally available as a paid workbook on different platforms. Tricked into clicking on the downloaded file, people in fact trigger malware installation. AsyncRAT Spreads in Fake eBook Files… Continue reading AsyncRAT Spreads As Fake eBook Files, Uses LNK Files

Malware Protection

Malware Protection functions

Many people remain unaware of the substantial benefits of malware protection. While most have encountered the concept of computer threats, their understanding tends to be imprecise. In the past, the term “virus” frequently surfaced; now, “malware” has become the prevalent, albeit nebulous, term that casts a shadow of uncertainty over online threats. This vagueness partly… Continue reading Malware Protection

Polymorphic vs Metamorphic Virus

Difference Between Polymorphic and Metamorphic Viruses

Polymorphic and Metamorphic Malware: the Comparison In this article, we consider two types of pests: polymorphic and metamorphic viruses, which were designed to destroy the integrity of the operating system and harm the user. Before we find out what is the difference between polymorphic and metamorphic viruses, let’s figure out what is virus in general… Continue reading Polymorphic vs Metamorphic Virus

Stopabit Virus

If you see Stopabit in the Task Manager, your system is at risk

Stopabit is an unwanted application that has almost no useful functionality. Users can see its promotions as a useful tool for screen time control, but it in fact aims at exploiting the bandwith. This may lead to connectivity issues and illicit traffic being routed through the system. Such applications are commonly distributed through software bundling.… Continue reading Stopabit Virus