New malware removal guides

Backstineseudis.com Ads
Notification Spam

Backstineseudis.com Ads

Our researchers found backstineseudis[.]com while browsing suspect sites. After investigating this rogue webpage, we determined that it endorses browser notification spam and produces redirects to other (likely unreliable/harmful) websites. Backstineseudis[.]com and similar pages are mainly access

Euchakedne.com Ads
Notification Spam

Euchakedne.com Ads

While browsing suspect websites, our research team discovered the euchakedne[.]com rogue page. It is designed to promote browser notification spam and redirect visitors to other (likely untrustworthy/hazardous) sites. Webpages like euchakedne[.]com are primarily visited through redirects produced

Lilith RAT
Trojan

Lilith RAT

Lilith RAT is a remote access Trojan that lets the attackers to remotely control a computer. It is written in C++ programming language and gives attackers a lot of control over the infected device. Victims of Lilith RAT should eliminate the malware as soon as possible to avoid data theft and other

Bridgegapdevice.co.in Ads
Notification Spam

Bridgegapdevice.co.in Ads

Our research team discovered the bridgegapdevice.co[.]in rogue page while investigating dubious websites. After we examined this webpage, we learned that it endorses browser notification spam and generates redirects to other (likely questionable/hazardous) sites. The majority of visitors to bridg

Nanocrypt Ransomware
Ransomware

Nanocrypt Ransomware

Nanocrypt is ransomware our team discovered during an analysis of samples submitted to VirusTotal. After execution, Nanocrypt encrypts files and appends the ".ncrypt" extension to them. It also generates a text file ("README.txt") containing a ransom note. An example of how Nanocrypt renames files

Top malware removal guides

Internet Fraudsters Arrested Email Scam
Phishing/Scam

Internet Fraudsters Arrested Email Scam

After reading this "Internet Fraudsters Arrested", we determined that it is fake. This spam letter states that online scammers who had previously defrauded the recipient have been arrested, and the courts have ordered the Spanish government to compensate them two million euros. It must be emphasi

Server (IMAP) Session Authentication Email Scam
Phishing/Scam

Server (IMAP) Session Authentication Email Scam

Our inspection of the "Server (IMAP) Session Authentication" email revealed that it is spam. This fake message states that access to the recipient's email account has been restricted due to detected irregular activity. The goal is to trick users into disclosing their account log-in credentials (pa

Clarity Tab Browser Hijacker
Browser Hijacker

Clarity Tab Browser Hijacker

While investigating suspicious websites, our researchers discovered the Clarity Tab browser hijacker. This extension promises to provide new tab widgets (e.g., clock, weather, bookmarks, etc.) and browser wallpapers. However, it changes browser settings to promote (via redirects) a search engine.

Bank Details Email Scam
Phishing/Scam

Bank Details Email Scam

Our inspection of the "Bank Details" email revealed that it is spam. This message claims that the invoice sent by the recipient lacks their company bank details, so the sender asks for this information. This spam mail aims to lure victims into visiting a phishing website that targets email account

Cyber Security News

Crocodilus Malware Steals Crypto Wallet Keys
Date

Crocodilus Malware Steals Crypto Wallet Keys

Android users have long been the target of sophisticated banking trojan malware families. Some of the most prevalent threats, which have seen constant development and evolution, are Anatsa, Hook, and Octo. In a recent report by Threat Fabric, a new malware strain, Crocodilus, can be added to that li

VanHelsing Ransomware Comes To Encrypt Data
Date

VanHelsing Ransomware Comes To Encrypt Data

Security firm Cyfirma has recently discovered a new ransomware-as-a-service (RaaS) called VanHelsing. Once a name given to mythical slayers of Vampires, VanHelsing is now attached to a criminal enterprise designed to siphon a business' lifeblood in return for decrypting data, which the threat actors

Arcane Stealer Emerges
Date

Arcane Stealer Emerges

In a blog post published by Kaspersky Labs, security researchers revealed the discovery of a new information-stealing malware called Arcane Stealer by the cybersecurity firm. The malware is distributed fairly novel, in that it is distributed via YouTube and videos that provide users with computer ga

Akira Ransomware Bypass EDR Via Unpatched Webcam
Date

Akira Ransomware Bypass EDR Via Unpatched Webcam

In a recent attack by Akira ransomware threat actors, attempts to encrypt data were initially stopped; however, an unpatched webcam proved to be the entry point threat actors were looking for and managed to bypass Endpoint Detection and Response Software installed on the enterprise machines. T

Lazarus Linked To Massive Bybit Crypto Theft
Date

Lazarus Linked To Massive Bybit Crypto Theft

On February 21, 2025, Bybit reported that it had suffered a massive cryptocurrency theft, estimated at 1.46 billion USD using that day's exchange rate. Ethereum (ETH) was stolen from one of its ETH cold wallets, which stores cryptocurrency private keys offline. In practice, private keys are transfe

Top Antivirus Apps

Combo Cleaner Anti-Malware (for Windows computers)

Combo Cleaner Anti-Malware (for Windows computers)

Combo Cleaner is an anti-malware application for Windows computers (also available for Mac computers). It's developed by a company RCS LT which has been working in cyber security industry for over 10 years. The accumulated experience in internet security allowed us to create a robust anti-malware so

Download
Combo Cleaner: Antivirus and System Optimizer (for Mac computers)

Combo Cleaner: Antivirus and System Optimizer (for Mac computers)

Combo Cleaner is an antivirus and system optimizer created by a company called RCS LT. This application runs on Mac computers and works with all recent Mac operating systems, including Yosemite, macOS 13 Ventura, and macOS 14 Sonoma. This application takes a different approach as compared to tradit

Download
Malwarebytes Premium

Malwarebytes Premium

Over the years, signature-based malware detection has proven vulnerable to abuse by malware developers. Good companies will quickly adapt to new malware versions, creating new and better signatures for malware detection. However, there is still a time delay between discovery and detection. Behavi