Gridinsoft Security Lab

What is GorillaBot?

GorillaBot: Advanced Mirai Variant Targeting IoT Devices with Enhanced DDoS Capabilities

Stephanie AdlamApr 9, 202511 min read

GorillaBot is a sophisticated botnet malware that has been making headlines for its aggressive DDoS attacks. Building on the infamous…

Trojan:PowerShell/CoinStearler.RP!MTB Virus Detection Analysis & Removal Guide

Trojan:PowerShell/CoinStealer.RP!MTB

Stephanie AdlamAug 29, 20246 min read

Trojan:PowerShell/CoinStealer.RP!MTB is a detection of Microsoft Defender, that normally flags malware that can steal cryptocurrency wallets. You may see it popping up after downloading a program from the Web or running a dodgy PowerShell script. More precisely, it collects credentials of different applications, and crypto wallets are among its primary targets. The Stealthiness of this […]

PUABundler:Win32/DriverPack Unwanted Program Review & Removal Guide

PUABundler:Win32/DriverPack

Stephanie AdlamAug 27, 20248 min read

PUABundler:Win32/DriverPack is potentially unwanted software that claims to install or update drivers. In fact, it floods the system with unwanted software and changes browser settings without the user’s consent. In this post, I will explain the dangers behind this unwanted app and show the ways to remove it from the system. PUABundler:Win32/DriverPack Overview PUABundler:Win32/DriverPack is […]

Virus Alert (05261) Scam Site Explained

Virus Alert (05261) Scam

Stephanie AdlamSep 5, 20248 min read

“Virus Alert (05261)” is a scam pop-up message you can see on a website that looks like a Microsoft page, but with a strange URL. It tries convincing people about their system being in trouble. As proof of it, they show a banner saying about outdated apps, incorrect privacy settings, and more critical problems. The […]

What is Movidown PUA? Detailed Analysis

Movidown Unwanted Application

Stephanie AdlamAug 20, 20246 min read

Movidown is an Unwanted Application that initially mimics a utility for controlling fan speed. However, beneath this shell, it has the capabilities of a dropper malware, which it right away uses to deploy browser hijackers. This functionality, together with the deep access to the system, creates potential risks for much more severe malware to get […]

"Managed by Your Organization" in Browser Explained & Removal Guide

“Managed by Your Organization” – How to Remove From Chrome?

Stephanie AdlamNov 2, 20244 min read

“Managed by your organization” is a line that appears when the web browser is attacked by browser hijackers. This malware abuses a legitimate Chrome policy to make itself impossible to delete. And it turns out to be pretty effective – without a special approach, all browser plugins remain untouchable after this line appears. In this […]

PUA:Win32/SBYinYing Virus Analysis

PUA:Win32/SBYinYing

Stephanie AdlamAug 9, 20247 min read

PUA:Win32/SBYinYing is a potentially unwanted application (PUA) that is often bundled with certain cracked games. It may display ads to users or redirect them to potentially harmful websites, which puts it in the same line with adware and browser hijackers. Most often, user get infected with that malware after downloading cracked software. PUA:Win32/SBYinYing Overview PUA:Win32/SBYinYing […]

Disable Windows Defender - Windows 10/11 Guide

How to Disable Windows Defender: Windows 10 & 11 (With Safety Warnings)

Stephanie AdlamJun 24, 202514 min read

Disabling Microsoft Defender is a common request from Windows users worldwide, often driven by performance concerns or conflicts with third-party security software. While Microsoft Defender has evolved into a capable security solution, there are legitimate scenarios where users need to disable it temporarily or permanently. This comprehensive guide explains safe methods to disable Windows Defender […]

Trojan:Win32/Qhosts.L Analysis & Removal Guide

Trojan:Win32/Qhosts

Stephanie AdlamAug 9, 20246 min read

Trojan:Win32/Qhosts is malware that provides remote access to the target system and modifies the Hosts file. It is primarily distributed through illegal activation tools found on torrent and warez sites. While the mentioned interaction with the system configuration file as a definitive feature, it is capable of much, much more unpleasant activities. Trojan:Win32/Qhosts Overview Trojan:Win32/Qhosts […]

What is PUABundler:Win32/YandexBundled? Removal Guide

PUABundler:Win32/YandexBundled

Stephanie AdlamAug 9, 20247 min read

PUABundler:Win32/YandexBundled is a detection of potentially unwanted application (PUA) associated with the Russian company Yandex. It is typically distributed as bundled software with repackaged or free programs. While being less dangerous than malware, it can still threaten both the privacy and normal operations of one’s computer. What is PUABundler:Win32/YandexBundled? PUABundler:Win32/YandexBundled is a generic detection name […]

Docker Engine Auth Bypass Vulnerability Abuses Authentication Plugins

Docker Engine Authentication Bypass Vulnerability Exploited

Stephanie AdlamJul 25, 20243 min read

Attackers are actively exploiting a critical vulnerability in the Docker Engine that may allow for authentication bypass in a chain attack. This vulnerability allows attackers to bypass AuthZ authorization plugins, effectively mutilating any auth control. For this and several other reasons, the flaw got the max severity score possible (10.0). Critical Docker Engine Flaw Allows […]

Hamster Kombat Tap-Game Players Targeted in Malware Spreading

Hamster Kombat Players Targeted in a New Malware Spreading Scheme

Stephanie AdlamJul 25, 20245 min read

Players of Hamster Kombat have become prime targets for scammers promoting phishing schemes aimed at those looking for easy earnings. Malicious actors steal confidential data and infect inattentive players with malware. Due to the technical aspects of Hamster Kombat, these fraudulent schemes are highly successful. Hamster Kombat Tap-Game Players Targeted in Malware Spreading ESET researchers […]

What is Trojan:BAT/PSRunner.VS!MSR? Removal Guide

Trojan:BAT/PSRunner.VS!MSR

Stephanie AdlamJul 23, 20245 min read

Trojan:BAT/PSRunner.VS!MSR is a detection of malware that executes malicious commands on a compromised system. It does not do much hurt by itself and rather serves for payload delivery & running. Aside from that, it does some basic system reconnaissance and gains persistence for the further payloads. Trojan:BAT/PSRunner.VS!MSR Overview Trojan:BAT/PSRunner.VS!MSR is a type of malware detection […]

AI Assistant

Hello! 👋 How can I help you today?