Gridinsoft Security Lab

Ov3r_Stealer Malware Spreads Through Facebook Job Listings

Ov3r_Stealer Steals Crypto and Credentials, Exploits Facebook Job Ads

Stephanie AdlamFeb 8, 20245 min read

A new Windows malware called Ov3r_Stealer is spreading through fake Facebook job ads, according to a report by Trustwave SpiderLabs.…

BlackGuard Stealer Extends Crypto Stealing Functionality

BlackGuard Receives Update, Targets More Cryptowallets

Stephanie AdlamMar 24, 20236 min read

BlackGuard, a prolific infostealer malware, received an update at the edge of 2023. The new update introduced advanced data-stealing capabilities and secure connectivity features. The new version also includes a row of new anti-detection and anti-analysis capabilities. Let’s have a more detailed look into this malware and see the difference from all aspects. BlackGuard Stealer – What is it? BlackGuard is a classic infostealer malware, programmed in C#. It aims at grabbing personal data from web browsers, particularly seeking data…

Black Friday Shopping Scams in 2023

Black Friday Scams: Ways to Detect & Avoid Shopping Frauds

Stephanie AdlamNov 23, 20226 min read

As the main shopping event of the year approaches, Black Friday shopping scams have into view. Con actors from all over the world try to create the most convincing fraud, trying to make a fortune. Let’s see the most common Black Friday scams, and the way to avoid them. How Do Scams Work? Fraudsters use various methods to trick people into giving away their sensitive information or financial details, or straightly spending money for non-existent items. They create fake websites…

Social engineering attacks and Cybersecurity

Most Common Types of Social Engineering Attacks

Stephanie AdlamOct 4, 20225 min read

Intruders are developing more and more methods to get what they want. Social engineering is one of the most common methods through which fraudsters manage to deceive the user, manipulate him, and instill his fear and urgency. Once the victim is emotional, the fraudsters begin to cloud her judgment. Any human error is a vulnerability that makes social engineering work. This article will present the top most common types of social engineering. Along with it, you’ll see the guidance on…

Fargo Ransomware Microsoft SQL servers

Fargo Ransomware aims at vulnerable Microsoft SQL servers

Stephanie AdlamOct 3, 20225 min read

Ransomware rarely chooses the sole type of targets for their attacks. They roam from attacks on small coffee shops to strikes on governmental organisations, with the corresponding adaptations to their software. However, all classic handbooks about offensive operations state that it is important to find a vulnerability of a target and exploit it. Such a tactic became an option for Fargo ransomware – or, as it was known earlier, Mallox or TargetCompany1.…

proxy

Reverse Proxy vs Proxy

Stephanie AdlamJul 29, 20226 min read

What is a Reverse Proxy? A reverse proxy is the same server but is in front of a web server. Depending on its configuration, it allows or refuses the external connection to reach the endpoint. Reverse proxies are used to improve security, performance, and reliability. To understand how a reverse proxy works and what benefits it can provide, let’s first remember what a reverse proxy server is. What is a reverse proxy? Proxy Server Meaning A…

False Positive Gridinsoft

How to Report a False Positive Detection?

Polina LisovskayaJul 12, 20223 min read

Gridinsoft is an antivirus software company that provides powerful solutions for detecting and removing malware from computers. However, sometimes our software may generate false positive detections, which can frustrate users. If you believe we have wrongly detected a legitimate file as malware, you can report the false positive detection to us. Here are the steps to follow:

🚩 Automatical False Positive Submission Before the removal process, if you select the action "Ignore Always" for the file we are receiving a…

antivirus antimalware difference

Antivirus scanner and anti-malware. What is the difference?

Stephanie AdlamDec 29, 20214 min read

Antivirus, anti-malware software, antivirus scanner… There are so many terms, and all of them look so similar, but they’re different. It is easy to confuse the user who does not have any information about all these things. Thus, it is important to clear out these things in easy words. From a certain point of view, antivirus programs, anti-malware software, security tools, and antivirus scanners are just synonyms. Sure, they have a lot of things in common – enough to call…

Script-Based Malware

Script-based malware. How to stay protected?

Stephanie AdlamDec 29, 20216 min read

Over the last four years, the share of script-based attacks of malware offenses worldwide has grown so drastically that it raised alerts among security specialists and ordinary users. In this post, we shall regard script-based malware, assess its strengths and weaknesses, explain how the attacks happen, and suggest measures to maintain security in your workgroup. Security News: Greta Thunberg became the most popular character in phishing campaigns. What is script-based malware? To understand how someone can run a script-based attack…

Malware vs. Virus

Malware vs. Virus. Difference explained

Stephanie AdlamDec 22, 20215 min read

The topic of this small post is malware vs. virus conceptual clarification. We remember times when people used to call any harmful program a “virus”. Today this “malware” term popped out! How do these words correlate? People seem to use them freely and arbitrarily. But is such usage correct? Let’s investigate. For those who are not interested in a more thorough explanation, let’s say that a virus is a particular case of malware. Under malware, we understand any software created…

Discord virus

What is Discord virus? Investigating a new online fraud

Stephanie AdlamMar 11, 20212 min read

Discord virus is only the name of a spamming campaign that takes place on this communication platform. The exact type of malware you can get through these tricks may vary in an extensive range. Nonetheless, the fraudsters’ method to fool you cannot be named original. There are two well-distinguishable ways – thick and gentle. A thick method is used in massive attacks. The possible victim receives a malicious link with a clickbait text from an unknown user. Because all such…

worst computer virus

What is the worst computer virus? Figuring out

Stephanie AdlamJan 27, 20216 min read

Worst computer virus – what is it? Seems that anyone who has ever been infected asks this question. And each user will think that his case was more severe than someone’s else. Is that true? And which virus is really the worst? It is important to mention that computer viruses are not only “viruses”. Nowadays, the term “computer viruses” is used to describe all types of malicious programs. But, in fact, viruses are just the type of malware – same…

gridinsoft + chronicle

Gridinsoft becomes Google’s information security partner

Vladimir KrasnogolovyOct 29, 20202 min read

Gridinsoft LLC is proud to be one of 68 partners of VirusTotal, Google’s Information Security Service, in the array of malware scanners. Currently, Gridinsoft is the second information security company in Ukraine to be in an equal position with the world’s technology giants in this field. VirusTotal is a free online service provided by Google, which analyzes suspicious files, helps businesses and users quickly and accurately detect viruses, worms, trojans, and all other kinds of malicious software. [su_quote cite=”Irina Gridina,…

  1. Earlier notes about this group under a different name.