Step-by-Step Malware Removal Instructions

Capital One - Card Purchase Is Under Review Email Scam
Phishing/Scam

Capital One - Card Purchase Is Under Review Email Scam

Our examination of the "Capital One - Card Purchase Is Under Review" email revealed that it is fake. This is a phishing scam that targets online bank account log-in credentials. It must be emphasized that the information in this message is false, and this email is not associated with the actual Ca

BlackMoon Malware
Trojan

BlackMoon Malware

BlackMoon, also known as KrBanker, is a malware categorized as a banking trojan. It has been around since 2014 and has undergone significant changes in its multiple iterations. In the first known attacks involving this malware, it was used to target the customers of South Korean banks. The purpos

X Crypto Giveaway POP-UP Scam
Phishing/Scam

X Crypto Giveaway POP-UP Scam

During our analysis, we concluded that this is one of the fake crypto giveaways where fraudsters impersonate famous personalities to trick people into sending cryptocurrency. This scam also involves a deepfake. This and similar web pages should be ignored and closed if ever encountered to avoid mo

SpiderParadise Ransomware
Ransomware

SpiderParadise Ransomware

SpiderParadise is ransomware designed to make files inaccessible by encrypting them. It provides a ransom note (a text file named "HOW_TO_RECOVER.txt") containing payment and contact information. Unlike most ransomware, SpiderParadise does not append any extension to files. Screenshot of files

Pentagon Stealer
Trojan

Pentagon Stealer

Pentagon is a malicious program written in the Go programming language. It is classified as a stealer because it is designed to extract and exfiltrate vulnerable information from compromised devices. Pentagon operates as a stealer – a type of malware that steals data from infected systems.

Update Your Webmail Account Settings Email Scam
Phishing/Scam

Update Your Webmail Account Settings Email Scam

We have inspected the email and discovered that it is used to trick unsuspecting recipients into disclosing personal information on a fake web page. Thus, we classified it as a phishing email. Usually, scammers behind such emails pretend to be legitimate companies or other entities. This p

OriginalAccessibility Adware (Mac)
Mac Virus

OriginalAccessibility Adware (Mac)

Our analysis shows that OriginalAccessibility exhibits characteristics commonly associated with adware. It is designed to bombard users with intrusive advertisements. These ads can expose users to various scams and other online threats. It is also worth noting that multiple security vendors flag

OtterCookie Malware
Trojan

OtterCookie Malware

OtterCookie is a piece of malicious software designed to steal information. This program has several variants, and it has been around since at least the autumn of 2024. Attacks involving OtterCookie have been linked to North Korean threat actors. This malware has been leveraged against targets as

Hunter (Prince) Ransomware
Ransomware

Hunter (Prince) Ransomware

Our team has discovered a ransomware variant based on Prince ransomware, called Hunter, during analysis of malware samples submitted to VirusTotal. Hunter encrypts data and appends the ".Hunter" extension to files. Also, it drops a ransom note ("Decryption Instructions.txt") and changes the deskto

Pdf2docs.com Redirect
Browser Hijacker

Pdf2docs.com Redirect

We have tested pdf2docs.com and found that it is supposed to provide search results, but it is actually a fake search engine. Our other finding is that pdf2docs.com is promoted through an extension (PDF2DOCS) that functions as a browser hijacker. Overall, pdf2docs.com and the associated extension