Gridinsoft Security Lab

What is Win64/Reflo.HNS!MTB?

Trojan:Win64/Reflo.HNS!MTB

Stephanie AdlamSep 10, 20246 min read

Win64/Reflo.HNS!MTB is a detection of a malware sample that aims at stealing confidential information. It usually spreads through game mods…

Rude Stealer: Analysis of a Rare Java Malware

Rude Stealer Targets Data from Gamer Platforms

Stephanie AdlamNov 25, 20235 min read

A newly discovered Java-based stealer named Rude has emerged, encapsulated within a Java Archive (JAR) file. It employs a range of sophisticated functionalities and focuses on stealing sensitive data from gaming platforms such as Steam, Discord, and other browsers. Rude Stealer Overview In early November 2023, researchers identified a malicious JAR file labeled “Stealer.jar” on […]

What is Windows Defender Security Warning?

What is Microsoft Security Warning Scam?

Stephanie AdlamNov 8, 20236 min read

Fraudsteds massively employ Microsoft Azure hosting to start Microsoft Security scam pages. They range from a scary warning that blocks your browser window to a phishing pages, indistinguishable from real. Let’s see the most typical types of these scams and their features. What is Windows Defender Security Warning? Fake Windows Defender Security Warning (Microsoft Security […]

Android:TrojanSMS-PA Detection - What is It?

What is Android:TrojanSMS-PA detection?

Stephanie AdlamOct 29, 20233 min read

Android:TrojanSMS-PA is a detection name from a built-in Huawei security tool. This particular name recently appeared as a detection of the Google app on Huawei devices. However, this name is not a 100% false positive, and here is why. What is Android:TrojanSMS-PA? As I said, Android:TrojanSMS-PA detection name is one of hundreds used by an […]

WinRAR RCE Vulnerability Exploited in the Wild

WinRAR Vulnerability Allows Arbitrary Code Execution

Stephanie AdlamOct 26, 20235 min read

Over the past few weeks, Google’s Threat Analysis Group (TAG) has reported a worrying trend. Experts have observed government-sponsored actors from different nations exploiting this WinRAR vulnerability as part of their operations. The vulnerability received an index of CVE-2023-38831. Even though a patch has since been released, many users remain vulnerable to potential attacks. WinRAR […]

Professional Hacker Email Scam - Is it True?

“Professional Hacker” Email Scam

Stephanie AdlamAug 29, 202410 min read

Among hundreds of different types of scam emails, there is a specific scary one that bothers people around the world. Known as “Professional Hacker” scam email, it claims that an illusory hacker has accessed your PC and gathered whatever information, including capturing videos through the web camera. The message is accompanied by a ransom demand […]

Top 10 Computer Viruses Ever Existed

TOP 10 Most Dangerous Computer Viruses In History

Stephanie AdlamMay 30, 20246 min read

Computer viruses really resemble real ones. They can infect thousands of computers in a matter of minutes, which is why we call their outbreak an epidemic. It’s hard to imagine how we could live without antivirus software now, but once it was a reality. But which virus was the most dangerous? I’ve compiled a list […]

What is Aluc Service and How to Remove It?

Aluc Service: What Is Aluc Appliaction & How to Remove?

Stephanie AdlamOct 27, 20245 min read

Aluc Service is a strange service you can spectate in the Task Manager. It is, in fact, a malware-related process that hides behind a legitimately-looking name. Most commonly, such a trick is done by coin miner malware and rootkits. What is Aluc Service? At a glance, Aluc Appliaction may look like a legit service among […]

Exim 0-day Vulnerablity Allows Executing Arbitrary Code

Exim Vulnerability Allows RCE, No Patches Available

Stephanie AdlamMay 31, 20243 min read

Exim Internet Mailer, a program massively used as a basis for mailing servers, appears to have a remote code execution vulnerability. By overflowing the buffer, hackers can make the program execute whatever code they need. Despite several reports to the developer, the patch is still not available. What is Exim? Exim is a mail transfer […]

RedLine and Vidar Developers Started Spreading Ransomware

Redline and Vidar Stealers Switch to Ransomware Delivery

Stephanie AdlamSep 20, 20235 min read

Cybercriminals who stand behind RedLine and Vidar stealers decided to diversify their activity. Now, crooks deploy ransomware, using the same spreading techniques as they used to deliver their spyware. Meanwhile, the process of ransomware enrollment is rather unusual and is full of advanced evasion techniques. What are Redline and Vidar Stealers? RedLine is an infostealer […]

GridinSoft Online File Virus Scanner Service

GridinSoft Launches Own Online Scanner Service – Meet Online Virus Scanner

Stephanie AdlamSep 18, 20233 min read

As a part of the GridinSoft team, I am proud to announce the public release of our own online virus scanner service! Now, you can scan the file and see all the information about it for free, by using GridinSoft Online Virus Checker. Let’s check out its key features and find out why it is […]

W3LL attacks Microsoft 365 accounts, bypassing MFA

W3LL Targets Microsoft 365 Accounts with Sophisticated Phishing Kit

Stephanie AdlamOct 7, 20239 min read

In the ever-evolving landscape of cyber threats, crooks continually find new and inventive ways to exploit vulnerabilities and target valuable assets. One such threat that has recently garnered significant attention is “W3LL.” Next, we will tell you what it is, what it is known for, and how it succeeded in its business over 6 years […]

HiatusRAT Analysis & Recent Attack Description

HiatusRAT Used in Attacks on Taiwan Companies and U.S. Military

Stephanie AdlamJan 13, 20247 min read

Recent attacks on US military systems and Taiwan companies are distinctive not only by the brave target choosing, but also for the used toolkit. In the case of both targets, attackers used HiatusRAT as an initial access/reconnaissance tool. Aside from being used in these attacks, Hiatus Trojan has other things to boast of. US DoD […]