Gridinsoft Security Lab

What is 0.31 BTC XLord promo code Scam?

0.31 BTC XLord Promo Code

Stephanie Adlam Apr 1, 2025 5 min read

Gotexcoin appears to be a fraudulent cryptocurrency platform that lures users with promises of free Bitcoin, specifically 0.31 BTC XLord…

Hamster Kombat Tap-Game Players Targeted in Malware Spreading

Hamster Kombat Players Targeted in a New Malware Spreading Scheme

Stephanie Adlam Jul 25, 2024 5 min read

Players of Hamster Kombat have become prime targets for scammers promoting phishing schemes aimed at those looking for easy earnings. Malicious actors steal confidential data and infect inattentive players with malware. Due to the technical aspects of Hamster Kombat, these fraudulent schemes are highly successful. Hamster Kombat Tap-Game Players Targeted in Malware Spreading ESET researchers […]

What is Trojan:BAT/PSRunner.VS!MSR? Removal Guide

Trojan:BAT/PSRunner.VS!MSR

Stephanie Adlam Jul 23, 2024 5 min read

Trojan:BAT/PSRunner.VS!MSR is a detection of malware that executes malicious commands on a compromised system. It does not do much hurt by itself and rather serves for payload delivery & running. Aside from that, it does some basic system reconnaissance and gains persistence for the further payloads. Trojan:BAT/PSRunner.VS!MSR Overview Trojan:BAT/PSRunner.VS!MSR is a type of malware detection […]

Jellyfish Loader Malware Overview

Jellyfish Loader Malware Discovered, Threatens 2024 Olympics

Stephanie Adlam Jul 21, 2024 5 min read

A new threat has been discovered in the form of a Windows shortcut that is actually a .NET-based shellcode downloader called Jellyfish Loader. It has some strange features that may signify that it is still at the development stage. Nonetheless, this malware is capable of deploying other malicious software in a selection of ways. Jellyfish […]

What is the difference between CSRF and XSS?

CSRF (Cross-Site Request Forgery) vs XSS

Stephanie Adlam Jul 9, 2025 8 min read

Cross-Site Request Forgery Cross-Site Request Forgery (CSRF) is an attack targeting vulnerabilities in computer security, posing significant risks to user information and accounts. It manipulates the web browser to perform unwanted actions within an application, harming the user logged into the system. A successful attack can lead to unauthorized money transfers, data theft, password changes, […]

Phishing vs Spoofing

Phishing vs Spoofing: Definition & Differences

Stephanie Adlam Jul 9, 2025 8 min read

What is a Phishing Attack? Phishing is a cyber-attack method that introduces malware to a computer via email. Intruders send users emails containing links under various pretexts. After clicking these links, the malware enters your computer. Thus, cybercriminals deceive the target to get as much data about the user as possible: his card numbers, bank […]

What is Trojan:Script/Downloader!MSR? Removal Guide

Trojan:Script/Downloader!MSR

Stephanie Adlam Jul 17, 2024 4 min read

Trojan:Script/Downloader!MSR is a malicious script that downloads other malware onto the target system. It is most commonly spread through illegal software and fake documents, and is capable of deploying pretty much any malicious program. Due to the complexity and the use of obfuscation, the exact malicious script may remain undetected, while the Defender will display […]

Trojan:Win32/Bearfoos.B!ml Malware Analysis & Removal

Trojan:Win32/Bearfoos.B!ml

Stephanie Adlam Jul 21, 2024 7 min read

Trojan:Win32/Bearfoos.B!ml is a detection of Microsoft Defender associated with data stealing malware. It may flag this malware due to the specific behavior patterns, assigning that name even to malicious programs of well-known families. As the Defender uses machine learning for this detection, it can sometimes be a false positive. Trojan:Win32/Bearfoos.B!ml Overview Trojan:Win32/Bearfoos.B!ml is a detection […]

Polymorphic Virus & Metamorphic Virus

Polymorphic vs Metamorphic Virus

Stephanie Adlam Jul 3, 2024 4 min read

Polymorphic and Metamorphic Malware: the Comparison In this article, we consider two types of pests: polymorphic and metamorphic viruses, which were designed to destroy the integrity of the operating system and harm the user. Before we find out what is the difference between polymorphic and metamorphic viruses, let’s figure out what is virus in general […]

Instagram Hacking Online Scams Frenzy

Fake Instagram Hacking Services

Stephanie Adlam Oct 19, 2024 5 min read

Instagram hacking scams is an old-new direction of online fraud that targets people who want to get into someone’s accounts on social media. Frauds poison search results, gather the users interested in such a service and push them to shady pages or ones that promote commercial spyware. A key risk for users here is the […]

What is Stopabit Virus? Threat Analysis & Uninstall

Stopabit Virus

Stephanie Adlam Jul 3, 2024 5 min read

Stopabit is an unwanted application that has almost no useful functionality. Users can see its promotions as a useful tool for screen time control, but it in fact aims at exploiting the bandwith. This may lead to connectivity issues and illicit traffic being routed through the system. Such applications are commonly distributed through software bundling. […]

What is Weather Zero? Removal Guide

Weather Zero

Stephanie Adlam Aug 29, 2024 4 min read

Weather Zero is a dropper-like unwanted program that disguises itself as a weather widget for Windows. It spreads as potentially unwanted software via bundling and can deliver malware to the target system. Its innocent looks make a lot of people ignore it or believe it is completely harmless and thus have little to no haste […]

Bloom.exe

Bloom.exe

Stephanie Adlam Jun 29, 2024 4 min read

Bloom.exe is a malicious miner that masquerades as a legitimate process. Its job is to use the victim’s device to mine cryptocurrency for con actors. The most visible sign of its presence, aside from the process in the Task Manager, is an enormously high CPU load that comes from it. This effectively renders your system […]

AI Assistant

Hello! 👋 How can I help you today?