Gridinsoft Security Lab

Trojan:Win32/Wacatac.H!ml Threat Analysis & Removal

Trojan:Win32/Wacatac.H!ml

Stephanie AdlamJun 21, 20245 min read

Trojan:Win32/Wacatac.H!ml is a detection of Microsoft Defender that may flag several different malware families. Once installed, it can deliver additional…

Coin Miner Investigation

Coin Miner Investigation: When, Why, For What

Vladislav BaglayFeb 26, 201815 min read

1. Coin Miner malware gains its popularity Due to rising cost of cryptocurrency recently, Bitcoin particularly (BTC) to 20000 USD, our Analysts Team noticed an increased amount of malicious programs, especially those who focused on the secret mining of cryptocurrency. GridinSoft Anti-malware detect them as Trojan.CoinMiner/Risk.CoinMiner. For few recent months CoinMiner is one of the top 20 the most popular threats among with Adware, that were super popular once. Most popular malware families for the last…

New Times, New Threats: Adware.Amonetize investigation

New Times, New Threats: Adware.Amonetize investigation

Vladislav BaglayOct 13, 20175 min read

Lately, our Team faced with complaints about Adware.amonetize virus. It hits most of the countries of Europe, the biggest quantity of infections is in China, Azerbaijan, Iran, Italy, Turkey, Saudi Arabia and Indonesia. It doesn’t matter Internet Explorer, Firefox, Google Chrome, Safari or other browsers do you use: you will see ads anyway. We investigated this virus and found that it spreads via a method we call bundling. It means that adware.amonetize sneaks into your system alongside with free software.…

Microsoft Tech Support scam affiliate program

Microsoft Tech Support Scam Affiliate Program

Vladislav BaglayMar 1, 20176 min read

The Microsoft Tech Support Scam has recently gained popularity as a new sector of cyber attacks. Scammers, masquerading as Microsoft Technical Support, pressure internet users into calling a supposedly toll-free phone number. Contrary to their claims, this number incurs significant charges, enabling fraudsters to profit from each call made. Responding to numerous claims from our users about these cyber attacks, we have conducted a detailed investigation into this fraudulent scheme. In this post, we will answer the most frequently asked…