Forced into installing a Chrome extension

We have found several sites created for the sole purpose of attempting to force users to install a Chrome extension. These sites are usually redirects from domains that offer cracks, keygens, and adult entertainment.Categories: Cybercrime
Social engin… Continue reading Forced into installing a Chrome extension

Configuring the Windows firewall

While the built-in Windows firewall may offer adequate protection, this is only true if you check the settings on a regular basis, and certainly immediately after removing an infection.Categories: 101
How-tosTags: allowed programsfrstmalwarenetshPiete… Continue reading Configuring the Windows firewall

Fake pharma sites are getting even more obnoxious

Recently, we have noticed that pharma sites seem to have discovered the use of JavaScript to change the “Stay or Leave” messages that you see, when you try to close or leave their sites.

Categories:

Tags:

(Read more…)

Continue reading Fake pharma sites are getting even more obnoxious

PUP Friday: Content Protector

Content Protector is an adware that is offered as a netfiltering program. This seems a bit strange for ad-supported software. It also comes with it’s own certificate.Categories: PUPs
Threat analysisTags: adwarecontent defenderContent protectornetfilte… Continue reading PUP Friday: Content Protector

Youndoo creates new Chrome profile

A new Youndoo hijacker from the Elex family copies most of the settings from an existing Chrome user account to create a fake, infected one.Categories: Cybercrime
MalwareTags: browser hijackerchromeelexfake Chrome profilePieter ArntzPUPPUPsYoundoo(Rea… Continue reading Youndoo creates new Chrome profile

Explained: WMI hijackers

This post describes how WMI hijackers work and why they are hard to find on an affected system. It also shows an example of such a hijacker called Yeabests after the domain it hijacks to.Categories: Cybercrime
MalwareTags: elexhijackerPieter ArntzPUPs… Continue reading Explained: WMI hijackers

File-in-the-middle hijackers

This may be a new trend among browser hijackers, but it seems more than a coincidence that we found two browser hijackers using a very similar approach to reach their goal of taking victims to the sites of their choice.Categories: Cybercrime
MalwareTa… Continue reading File-in-the-middle hijackers