Gridinsoft Security Lab

Trojan:Win32/Pomal!rfn: Detection & Removal Guide 2025

Trojan:Win32/Pomal!rfn: Detection & Removal Guide 2025

Stephanie Adlam Apr 10, 2025 18 min read

Trojan:Win32/Pomal!rfn is a detection commonly encountered when downloading programs like emulators or games. This heuristic detection, flagged by Microsoft Defender,…

W3LL attacks Microsoft 365 accounts, bypassing MFA

W3LL Targets Microsoft 365 Accounts with Sophisticated Phishing Kit

Stephanie Adlam Oct 7, 2023 9 min read

In the ever-evolving landscape of cyber threats, crooks continually find new and inventive ways to exploit vulnerabilities and target valuable assets. One such threat that has recently garnered significant attention is “W3LL.” Next, we will tell you what it is, what it is known for, and how it succeeded in its business over 6 years […]

HiatusRAT Analysis & Recent Attack Description

HiatusRAT Used in Attacks on Taiwan Companies and U.S. Military

Stephanie Adlam Jan 13, 2024 7 min read

Recent attacks on US military systems and Taiwan companies are distinctive not only by the brave target choosing, but also for the used toolkit. In the case of both targets, attackers used HiatusRAT as an initial access/reconnaissance tool. Aside from being used in these attacks, Hiatus Trojan has other things to boast of. US DoD […]

Phishing With Hacked Sites Gains Popularity

Phishing With Hacked Sites Becomes a Massive Menace

Stephanie Adlam Jul 9, 2025 5 min read

Threat actors started using compromised websites for phishing purposes much more frequently. Such worrying statistics popped up in several recent researches. This is not a brand new approach, though it may be particularly effective for fraudulent purposes. Hackers Use Poorly-protected Sites in Phishing Scams Cybercriminals often target abandoned WordPress websites with poor maintenance and security […]

Ways to Detect, Mitigate and Prevent Infostealer Malware

Infostealers: How to Detect, Remove and Prevent Information-Stealing Malware in 2025

Stephanie Adlam Apr 10, 2025 14 min read

Information is one of our most valuable assets in today’s digital world, making it a prime target for cybercriminals. These threat actors use specialized infostealer malware to extract sensitive data stored on your devices, putting your personal and financial information at serious risk. Cybersecurity experts have reported an alarming 103% increase in infostealer attacks during […]

FIN8 created a new Backdoor to inject Noberus Ransomware

FIN8 Updated Sardonic Backdoor to Deliver Noberus Ransomware

Stephanie Adlam Jul 21, 2023 5 min read

FIN8, an infamous group of cybercriminals, has updated its backdoor malware to avoid being detected. They made improvements and prepared to release a new type of crimeware called Noberus. This threat actor has returned after inactivity, using a modified version of their Sardonic backdoor to distribute the Noberus ransomware. This is a part of their […]

CVE-2023-36884 Microsoft Zero Day Vulnerability

Microsoft CVE-2023-36884 Vulnerability Exploited in the Wild

Stephanie Adlam May 31, 2024 3 min read

On July 11, 2023, Microsoft published an article about addressing the CVE-2023-36884 vulnerability. This breach allowed for remote code execution in Office and Windows HTML. Microsoft has acknowledged a targeted attack that exploits a vulnerability using specifically designed Microsoft Office documents. The attacker can gain control of a victim’s computer by creating a malicious Office […]

wise remote stealer

Wise Remote Trojan: Infostealer, RAT, DDoS Bot, and Ransomware

Vladimir Krasnogolovy May 30, 2024 4 min read

Wise Remote Stealer is a potent and malicious software that operates as an infostealer, Remote Access Trojan (RAT), DDoS bot, and ransomware. It has gained notoriety within the cybersecurity community due to its extensive range of capabilities and the threat it poses to individuals and organizations. Unveiling the Wise Remote Stealer Revelations from cybersecurity experts […]

Proxyjacking - A New Tactic Of Old Hackers

Proxyjacking: The Latest Cybercriminal Invention In Action

Stephanie Adlam Jul 7, 2023 7 min read

Today, in the constantly changing world of cyber threats, attackers always look for new ways to get more benefits with less effort. Recently, researchers found an example of this and called it proxyjacking for profit. What is proxyjacking? Proxyjacking is an attacker’s illegal use of a victim’s bandwidth for its own good. The closest related […]

New PlugX malware attacks target European diplomats

PlugX malware attacks European diplomats

Stephanie Adlam Jul 6, 2023 4 min read

Over the past few months, researchers have been monitoring the activity of a Chinese threat actor using PlugX malware to target foreign and domestic policy entities and embassies in Europe. This is a more significant trend among Chinese-based groups increasingly focusing on European entities, particularly their foreign policy. The countries most targeted in this campaign […]

RedEnergy – Ransomware or Infostealer?

RedEnergy Stealer-as-a-Ransomware On The Rise

Stephanie Adlam Dec 20, 2024 5 min read

Researchers have discovered a new form of malware called RedEnergy Stealer. It is categorized as Stealer-as-a-Ransomware but is not affiliated with the Australian company Red Energy. A malware called RedEnergy stealer uses a sneaky tactic to steal sensitive data from different web browsers. Its fundamental spreading way circulates fake updates – pop-ups and banners that […]

Darknet Forums and Malware Spreading: All You Need to Know

Malware Propagation On Darknet Forums

Stephanie Adlam Jun 21, 2023 8 min read

The forums on the dark web are well-known for being a hub of cybercriminal activity, including an auction system. Here, bad actors can trade tips on hacking, share samples of malware, and demonstrate how to exploit vulnerabilities. For those who develop malware, Darknet communication platforms, specifically forums, became a perfect marketing platform. The developers of […]

Cloud Mining Scams Spread Roamer, the Android banking trojan

Cloud Mining Scams Spread Banking Trojans

Stephanie Adlam Aug 17, 2024 4 min read

It’s no secret that cybercriminals are increasingly using mobile platforms as an attack vector lately. One example is a new Android malware. It spreads through fake cloud mining scams services and targets cryptocurrency wallets and online banking apps. Analysts dubbed this banking trojan as Roamer, though hackers may use different other malware for such attacks. […]

AI Assistant

Hello! 👋 How can I help you today?