New malware removal guides

888 Ransomware
Ransomware

888 Ransomware

888 is the name of a malicious program classed as ransomware. This malware operates by encrypting files and demanding payment for the decryption. On our testing system, the ransomware encrypted files and appended their names with a ".888" extension. For example, a file initially titled "1.jpg" as

CrazyHunter Ransomware
Ransomware

CrazyHunter Ransomware

Our research team discovered the CrazyHunter ransomware while reviewing new submissions to the VirusTotal website. This malicious program is designed to encrypt data and demand ransoms for the decryption. After we executed a sample of CrazyHunter on our testing system, it encrypted files and adde

Salvador Stealer (Android)
Trojan

Salvador Stealer (Android)

Salvador Stealer is malware targeting Android users. It is disguised as a banking application and extracts sensitive information from infected devices. Salvador Stealer sends the stolen details via Telegram Bot API. Victims should scan their devices and eliminate the malware as soon as possible.

Nullhexxx Ransomware
Ransomware

Nullhexxx Ransomware

We have inspected Nullhexxx, a malware discovered while analyzing samples submitted to VirusTotal, and found that it operates as ransomware. Nullhexxx encrypts files, appends an email address and the victim's ID to filenames, changes the desktop wallpaper, and provides a ransom note ("READ-ME-Null

Tornado Cash Scam
Phishing/Scam

Tornado Cash Scam

This "Tornado Cash" scam refers to deceptive websites that imitate the Tornado Cash (TornadoCash) platform. These fake pages are not associated with this cryptocurrency tumbler. The scam sites aim to trick users into exposing their wallets to a crypto drainer, and victims experience financial loss

Top malware removal guides

Server (IMAP) Session Authentication Email Scam
Phishing/Scam

Server (IMAP) Session Authentication Email Scam

Our inspection of the "Server (IMAP) Session Authentication" email revealed that it is spam. This fake message states that access to the recipient's email account has been restricted due to detected irregular activity. The goal is to trick users into disclosing their account log-in credentials (pa

Internet Fraudsters Arrested Email Scam
Phishing/Scam

Internet Fraudsters Arrested Email Scam

After reading this "Internet Fraudsters Arrested", we determined that it is fake. This spam letter states that online scammers who had previously defrauded the recipient have been arrested, and the courts have ordered the Spanish government to compensate them two million euros. It must be emphasi

Clarity Tab Browser Hijacker
Browser Hijacker

Clarity Tab Browser Hijacker

While investigating suspicious websites, our researchers discovered the Clarity Tab browser hijacker. This extension promises to provide new tab widgets (e.g., clock, weather, bookmarks, etc.) and browser wallpapers. However, it changes browser settings to promote (via redirects) a search engine.

Bank Details Email Scam
Phishing/Scam

Bank Details Email Scam

Our inspection of the "Bank Details" email revealed that it is spam. This message claims that the invoice sent by the recipient lacks their company bank details, so the sender asks for this information. This spam mail aims to lure victims into visiting a phishing website that targets email account

Cyber Security News

VanHelsing Ransomware Comes To Encrypt Data
Date

VanHelsing Ransomware Comes To Encrypt Data

Security firm Cyfirma has recently discovered a new ransomware-as-a-service (RaaS) called VanHelsing. Once a name given to mythical slayers of Vampires, VanHelsing is now attached to a criminal enterprise designed to siphon a business' lifeblood in return for decrypting data, which the threat actors

Arcane Stealer Emerges
Date

Arcane Stealer Emerges

In a blog post published by Kaspersky Labs, security researchers revealed the discovery of a new information-stealing malware called Arcane Stealer by the cybersecurity firm. The malware is distributed fairly novel, in that it is distributed via YouTube and videos that provide users with computer ga

Akira Ransomware Bypass EDR Via Unpatched Webcam
Date

Akira Ransomware Bypass EDR Via Unpatched Webcam

In a recent attack by Akira ransomware threat actors, attempts to encrypt data were initially stopped; however, an unpatched webcam proved to be the entry point threat actors were looking for and managed to bypass Endpoint Detection and Response Software installed on the enterprise machines. T

Lazarus Linked To Massive Bybit Crypto Theft
Date

Lazarus Linked To Massive Bybit Crypto Theft

On February 21, 2025, Bybit reported that it had suffered a massive cryptocurrency theft, estimated at 1.46 billion USD using that day's exchange rate. Ethereum (ETH) was stolen from one of its ETH cold wallets, which stores cryptocurrency private keys offline. In practice, private keys are transfe

Black Basta Internal Chat Logs Leaked
Date

Black Basta Internal Chat Logs Leaked

An unknown leaker, going by the alias ExploitedWhispers, has released what they claim to be an archive of internal Matrix chat logs belonging to the Black Basta ransomware operation. Now removed, the stolen messages were originally uploaded to the MEGA file-sharing platform. Since their removal fro

Top Antivirus Apps

Combo Cleaner Anti-Malware (for Windows computers)

Combo Cleaner Anti-Malware (for Windows computers)

Combo Cleaner is an anti-malware application for Windows computers (also available for Mac computers). It's developed by a company RCS LT which has been working in cyber security industry for over 10 years. The accumulated experience in internet security allowed us to create a robust anti-malware so

Download
Combo Cleaner: Antivirus and System Optimizer (for Mac computers)

Combo Cleaner: Antivirus and System Optimizer (for Mac computers)

Combo Cleaner is an antivirus and system optimizer created by a company called RCS LT. This application runs on Mac computers and works with all recent Mac operating systems, including Yosemite, macOS 13 Ventura, and macOS 14 Sonoma. This application takes a different approach as compared to traditi

Download
Malwarebytes Premium

Malwarebytes Premium

Over the years, signature-based malware detection has proven vulnerable to abuse by malware developers. Good companies will quickly adapt to new malware versions, creating new and better signatures for malware detection. However, there is still a time delay between discovery and detection. Behavi