Advertisement · 728 × 90
#
Hashtag
#avast
Advertisement · 728 × 90
Preview
A fake website impersonating Avast antivirus is tricking people into infecting their own computers. The site looks legitimate, runs what appears to be a virus scan, and claims your system is full of threats. But the results are fake: when you’re prompted to “fix” the problem, the download you’re given is actually **Venom Stealer** —a type of malware designed to steal passwords, session cookies, and cryptocurrency wallet data. This is a classic scare-and-fix scam: create panic, then offer a solution. In this case, the “solution” abuses the trusted Avast brand to deliver the attack. ## **A scan that finds exactly what the attacker wants you to see** The phishing page is a recreation of the Avast brand, complete with navigation bar, logo, and reassuring certification badges. Visitors are invited to run what appears to be a comprehensive virus scan. Once they click, the page stages a brief animation before delivering its predetermined verdict: three threats found, three threats removed, system protected. A scrolling console log names a specific detection—`Trojan:Win32/Zbot.AA!dll`—to lend the performance an air of specificity. The victim is then prompted to download the cure: a file called `Avast_system_cleaner.exe`. This is the payload. And far from cleaning anything, it immediately begins stealing. ## **A Chrome service that is not Chrome** When the victim launches `Avast_system_cleaner.exe`, the binary—a 64-bit Windows PE executable roughly 2 MB in size—copies itself into a location designed to blend in with legitimate software: `C:\Program Files\Google\Chrome\Application\v20svc.exe`. The dropped file is byte-for-byte identical to the parent, sharing the same MD5 hash (`0a32d6abea15f3bfe2a74763ba6c4ef5`). It then launches the copy with the command-line flag `--v20c`, a meaningless argument whose sole purpose is to signal to the malware that it is running in its second-stage role. The disguise is deliberate. A process named v20svc.exe sitting inside Chrome’s application directory looks, at a glance, like a legitimate browser service component. Anyone scanning their task manager would likely scroll past it without a second thought. This is a textbook example of masquerading: naming a malicious binary to match the conventions of trusted software so it escapes casual inspection. A debug artifact baked into the binary confirms its lineage: the PDB path reads `crypter_stub.pdb`, indicating the executable was packed using a crypter, which is a tool designed to scramble a payload’s code so antivirus engines cannot recognise it from its signature alone. At the time of analysis, only 27% of engines on VirusTotal flagged the sample, meaning roughly three in four commercial antivirus products missed it entirely. YARA rules matched the sample to the **Venom Stealer** malware family, a known descendant of the Quasar RAT framework that has been sold on underground forums since at least 2020. Venom Stealer is purpose-built for data theft: browser credentials, session cookies, cryptocurrency wallets, and credit card details stored in browsers. ## **Every cookie, every wallet, every saved password** Once running, the malware works through a checklist of high-value targets on the victim’s machine. It starts with browsers. Behavioral analysis confirms the malware harvests saved credentials and session cookies. In the analysis environment, it was observed directly accessing Firefox’s cookie database at `C:\Users\<USER>\AppData\Roaming\Mozilla\Firefox\Profiles\<profile>\cookies.sqlite-shm`. Process memory also contained fully-formed JSON structures with stolen cookie data from Microsoft Edge and Google Chrome, including active sessions for Netflix, YouTube, Reddit, Facebook, LinkedIn, AliExpress, Outlook, Adobe, and Google. Stolen session cookies give the attacker the ability to hijack authenticated browser sessions without needing the victim’s password, including sessions protected by two-factor authentication. The malware also targets cryptocurrency wallets. Behavioral signatures confirm it searches for and attempts to steal locally-stored wallet data, and Venom Stealer is documented as targeting desktop wallet applications. For anyone holding crypto assets on a hot wallet, the implications are immediate. Beyond credentials, the stealer captures a screenshot of the victim’s desktop, saved temporarily as `C:\Users\<USER>\AppData\Local\Temp\screenshot_5sIczFxY95t2IQ5u.jpg`, and writes a session tracking file to `C:\Users\<USER>\AppData\Roaming\Microsoft\fd1cd7a3\sess`. A small marker file is also dropped at `C:\Users\Public\NTUSER.dat`—a path chosen to mimic a legitimate Windows registry hive file and avoid suspicion. ## **Disguised as analytics, delivered over plain HTTP** All stolen data is exfiltrated to a single command-and-control domain: `app-metrics-cdn[.]com`, which resolved to `104.21.14.89` (a Cloudflare address) during analysis. The domain name is crafted to look like a benign analytics or content delivery service, the kind of traffic that might not raise alarm bells in a corporate proxy log. The exfiltration follows a structured four-step sequence over unencrypted HTTP. First, a multipart form-data POST to `/api/upload` transmits the collected file—screenshots, wallet data, cookie databases—totalling around 140 KB. A second POST to /`api/upload-json` sends a structured JSON payload of approximately 29 KB containing parsed credentials and cookies. A confirmation POST to `/api/upload-complete` signals that the theft is finished. The malware then enters a heartbeat loop, periodically checking in at `/api/listener/heartbeat` to maintain contact with the operator’s infrastructure. All of this traffic uses a generic Mozilla/5.0 user-agent string, another attempt to blend in with ordinary web browsing. ## **Syscalls, sleep loops, and debugger checks** Venom Stealer does not simply steal and leave. It takes significant steps to avoid being caught. The most notable evasion technique is the use of direct and indirect system calls, a method where the malware invokes Windows kernel functions directly rather than routing through the standard `ntdll.dll `library. Because most endpoint detection tools work by intercepting calls to that library, this technique effectively blinds them. This behaviour was flagged in both the parent and the dropped child process. The malware also checks whether it is being debugged, queries CPU vendor and model information, reads the volume serial number of the system drive, creates guard pages in memory that can crash debuggers attempting to step through the code, and enumerates running processes. These are common techniques for detecting virtual machines and analysis environments. To frustrate automated analysis further, it incorporates sleep calls exceeding three minutes. ## **This is not a new trick** Impersonating security software to distribute malware is one of the oldest tricks in the book. A user who believes their system is infected is primed to act urgently, and a page that looks like a trusted antivirus vendor is exactly the kind of authority they will defer to. By staging a fake scan that “finds” threats and then offering a cure, the attacker exploits both fear and trust in a single interaction. This is not an isolated tactic. In May 2025, DomainTools documented a separate campaign in which attackers built a convincing clone of Bitdefender’s website and used it to distribute Venom RAT alongside the StormKitty stealer. The playbook is nearly identical: impersonate a security brand, manufacture urgency, and deliver a Trojan dressed as protection. It suggests this is a repeatable template, not a one-off experiment. ## What to do if you may have been affected Only download security software from official vendor websites. Avast’s legitimate site is avast.com. Do not trust search engine results, ads, or links in unsolicited emails. If you interacted with a site like this or downloaded the file, act quickly: * **Check if your system is infected**. Look for the file `v20svc.exe` in `C:\Program Files\Google\Chrome\Application\`. If it exists, your system was likely compromised by this malware. * **Run a full system scan immediately**. Use a trusted, up-to-date anti-malware tool (such as Malwarebytes) to detect and remove the infection. If the scan finds threats, follow the tool’s recommendations to quarantine or delete them. * **Change your password right away.** Start with email, banking, and any important accounts. Assume anything saved in your browser has been exposed. * **Sign out of all active sessions**. Log out of services like Google, Microsoft, Facebook, and Netflix. Stolen session cookies allow an attacker to bypass two-factor authentication entirely. * **Protect cryptocurrency funds**. If you use a desktop cryptocurrency wallet, transfer your funds to a new wallet generated on a clean device as soon as possible. ## **Indicators of Compromise (IOCs)** **File hashes** * SHA-256: `ecbeaa13921dbad8028d29534c3878503f45a82a09cf27857fa4335bd1c9286d` **Domains** * `app-metrics-cdn[.]com` **Network indicators** * `104.21.14.89` **C2 URLs** * `http://app-metrics-cdn[.]com/api/upload` * `http://app-metrics-cdn[.]com/api/upload-json` * `http://app-metrics-cdn[.]com/api/upload-complete` * `http://app-metrics-cdn[.]com/api/listener/heartbeat` * * * **We don’t just report on threats—we remove them** Cybersecurity risks should never spread beyond a headline. Keep threats off your devices by downloading Malwarebytes today.

Bogus Avast website fakes virus scan, installs Venom Stealer instead A fake Avast scan tells you your PC is infected, then installs the malware that steals passwords, session data and crypto wallet...

#News #Threat #Intel #avast #infostealer

Origin | Interest | Match

0 0 0 0
Don’t Click Fake Virus Warnings - (Explained by the Avast Bears!)
Don’t Click Fake Virus Warnings - (Explained by the Avast Bears!) YouTube video by Norbert “Bob” Gostischa

Don’t Click Fake Virus Warnings - (Explained by the Avast Bears!)
#bob3160 #Avast #AvastBears #cybertip #scamalert #popupwarning #onlinesafety #securitytips #techtips #seniors #malware #phishing #teddytip youtube.com/shorts/uqNIe...

0 0 0 0
The Fake Update Trap - (Explained by the Avast Bears!)
The Fake Update Trap - (Explained by the Avast Bears!) YouTube video by Norbert “Bob” Gostischa

The Fake Update Trap - (Explained by the Avast Bears!)
#bob3160 #Avast #cybersecurity #avastbears #antivirus #malware #security #cyberattack #phishing #computersafety #internetsafety #teddytip youtube.com/shorts/6h4Qm...

0 0 0 0
Avast AntiTrack - (Explained by the Avast Bears!)
Avast AntiTrack - (Explained by the Avast Bears!) YouTube video by Norbert “Bob” Gostischa

Avast AntiTrack - (Explained by the Avast Bears!)
#bob3160 #Avast #AntiTrack #Cybersecurity #TeddyTips #OnlinePrivacy #TechSafety #StopTracking #AvastBears #DigitalPrivacy #AdBlock youtube.com/shorts/Fk60F...

0 0 0 0
Avast Data Shredder - (Explained by the Avast Bears!)
Avast Data Shredder - (Explained by the Avast Bears!) YouTube video by Norbert “Bob” Gostischa

Avast Data Shredder - (Explained by the Avast Bears!)
#bob3160 #Avast #Cybersecurity #TeddyTips #FileSecurity #TechSafety #Privacy #AvastBears #OnlineSecurity #DataProtection
youtube.com/shorts/XVS1y...

0 0 0 0
Sneaky Browser Extension - (Explained by the Avast Bears!)
Sneaky Browser Extension - (Explained by the Avast Bears!) YouTube video by Norbert “Bob” Gostischa

Sneaky Browser Extension - (Explained by the Avast Bears!)
#bob3160 #Avast #cybersecurity #extensions #browser #malware #spyware #avastbears #security #privacy #computersafety #online
youtube.com/shorts/ujpKs...

0 0 0 0
Avast Bears vs The Sneaky Virus - How Antivirus Stops Malware
Avast Bears vs The Sneaky Virus - How Antivirus Stops Malware YouTube video by Norbert “Bob” Gostischa

Avast Bears vs The Sneaky Virus - How Antivirus Stops Malware
#bob3160 #Avast #antivirus #cybersecurity #malware #virus #protection #onlinesafety #cybertips #security #animation #bears youtube.com/shorts/jvrdL...

0 0 0 0
Preview
Avast We believe everyone has the right to be safe online, which is why we offer our award-winning free antivirus to millions of people around the world.

The latest update for #Avast includes "How to avoid the fake buyers flooding Facebook Marketplace" and "My close call with an adoption scam and the red flags to watch for".

#Cybersecurity #AntiVirus #VPN https://opsmtrs.com/3OHCV4g

0 0 0 0
Avast Bears Fight Computer Viruses (And Make Cybersecurity Fun!)
Avast Bears Fight Computer Viruses (And Make Cybersecurity Fun!) YouTube video by Norbert “Bob” Gostischa

Avast Bears Fight Computer Viruses (And Make Cybersecurity Fun!)
#bob3160 #cybersecurity #Avast #bears #antivirus #malware #virusprotection #onlinesafety #cybertips #techfun #animation youtube.com/shorts/bk_dL...

0 0 0 0
Avast Network Inspector - (Explained by the Avast Bears!)
Avast Network Inspector - (Explained by the Avast Bears!) YouTube video by Norbert “Bob” Gostischa

Avast Network Inspector - (Explained by the Avast Bears!)
#bob3160 #Avast #NetworkInspector #Cybersecurity #TeddyTips #WiFiSecurity #TechSafety #HomeNetwork #AvastBears #RouterSafety #OnlineSecurity youtube.com/shorts/NA7zx...

0 0 0 0
Avast SmartScan - (Explained by the Avast Bears!)
Avast SmartScan - (Explained by the Avast Bears!) YouTube video by Norbert “Bob” Gostischa

Avast SmartScan - (Explained by the Avast Bears!)
#bob3160 #Avast #SmartScan #Cybersecurity #TeddyTips #Antivirus #TechSafety #PCHealth
youtube.com/shorts/Nqc5M...

0 0 0 0
Avast Boot-Time Scan (Explained by the Avast Bears!)
Avast Boot-Time Scan (Explained by the Avast Bears!) YouTube video by Norbert “Bob” Gostischa

Avast Boot-Time Scan (Explained by the Avast Bears!)
#bob3160 #Avast #Cybersecurity #BootTimeScan #AvastBears #TeddyTips #OnlineSafety #Antivirus #TechForSeniors #WindowsSecurity #MalwareProtection youtube.com/shorts/U5tGd...

0 0 0 0
Original post on helpnetsecurity.com

New infosec products of the month: February 2026 Here’s a look at the most interesting products from the past month, featuring releases from Aikido Security, Avast, Armis, Black Duck, Compliance ...

#News #Aikido #Security #Armis #Avast #Black #Duck […]

[Original post on helpnetsecurity.com]

0 0 0 0
The Importance of Restating Your Computer - (Explained by the Avast Bears!)
The Importance of Restating Your Computer - (Explained by the Avast Bears!) YouTube video by Norbert “Bob” Gostischa

The Importance of Restating Your Computer - (Explained by the Avast Bears!)
#ComputerTips #Grok #Windows11 #Restart #AvastBears #TechHelp #LaptopTips #PCMaintenance #SimpleTech #Bob3160 #CyberSecurity #VirusRemoval #Avast youtube.com/shorts/2soWQ...

0 0 0 0
Preview
Fake Avast Website Targets Users With €499 Phishing Refund Scam Follow us on all social media @Hackread

📢🪝Watch out as scammers are cloning Avast’s website to push fake €499 charges and steal credit card details using urgency tricks, live chat, and realistic payment checks.

#CyberSecurity #Phishing #Scam #Avast #Malware

Read: hackread.com/fake-avast-w...

3 2 1 0
Invitation to Download Avast Antivirus - (Explained by the Avast Bears!)
Invitation to Download Avast Antivirus - (Explained by the Avast Bears!) YouTube video by Norbert “Bob” Gostischa

Invitation to Download Avast Antivirus - (Explained by the Avast Bears!)
#bob3160 #Avast #Antivirus #Cybersecurity #FreeAntivirus #OnlineSafety #TechTips #AvastBears #ComputerSecurity #MalwareProtection #InternetSafety youtube.com/shorts/7h9RB...

0 0 0 0
Phishing Scam Awareness - (Explained by the Avast Bears!)
Phishing Scam Awareness - (Explained by the Avast Bears!) YouTube video by Norbert “Bob” Gostischa

Phishing Scam Awareness - (Explained by the Avast Bears!)
#bob3160 #TeddyTips #Phishing #ScamAlert #OnlineSafety #AvastBears #CyberSecurity #TechTips #InternetSafety #FakeLinks #EmailScams #Avast youtube.com/shorts/QahK4...

0 0 0 0
Preview
Refund scam impersonates Avast to harvest credit card details A convincing fake Avast site displays a €499.99 charge and promises a refund. Instead, it harvests your name, address, and full credit card details.

🚨 Refund scam impersonates Avast

Threat actors are spoofing #Avast refund notifications to trick victims into submitting credit card details, leveraging brand impersonation, urgency tactics, and fake support workflows to harvest financial data.

#ransomNews #Phishing #ScamAlert

2 0 0 0
Avast Behavior Shield - (Explained by the Avast Bears!)
Avast Behavior Shield - (Explained by the Avast Bears!) YouTube video by Norbert “Bob” Gostischa

Avast Behavior Shield - (Explained by the Avast Bears!)
#bob3160 #BehaviorShield #Security #Viruses #Antivirus #Protection #Safety #Tech #Cybersecurity #TeddyTips #Avast
youtube.com/shorts/R4h87...

0 0 0 0

Avast Behavior Shield - (Explained by the Avast Bears!)
#bob3160 #BehaviorShield #Security #Viruses #Antivirus #Protection #Safety #Tech #Potatosecurity #TeddyTips #Avast
youtube.com/shorts/R4h87...

0 0 0 0
Preview
Windows Malware Distributed Through Pirated Games Infects Over 400,000 Systems   A Windows-focused malware operation spreading through pirated PC games has potentially compromised more than 400,000 devices worldwide, according to research released by Cyderes. The company identified the threat as “RenEngine loader” and reported that roughly 30,000 affected users are located in the United States alone. Investigators found the malicious code embedded inside cracked and repackaged versions of popular game franchises, including Far Cry, Need for Speed, FIFA, and Assassin’s Creed. The infected installers appear to function normally, allowing users to download and play the games. However, while the visible game content runs as expected, concealed code executes in parallel without the user’s awareness. Researchers traced part of the operation to a legitimate launcher built on Ren'Py, an engine commonly used for visual novel-style games. The attackers embedded harmful components within this launcher framework. When executed, the launcher decompresses archived game files as intended, but at the same time initiates the hidden malware routine. According to Cyderes, the campaign has been active since at least April of last year and remains ongoing. In October, the operators modified the malware to include an embedded telemetry URL. Each time the RenEngine loader runs, it connects to this address, allowing the attackers to log activity. Analysis of that telemetry endpoint enabled researchers to estimate overall infection levels, with the system recording between 4,000 and 10,000 visits per day. Telemetry data indicates that the largest concentration of victims is located in India, the United States, and Brazil. The US accounts for approximately 30,000 of the infected systems identified through this tracking mechanism. The loader’s primary function is to deliver additional malicious software onto compromised machines. In multiple cases, researchers observed it deploying a Windows-based information stealer known as ARC. This malware is designed to extract stored browser passwords, session cookies, cryptocurrency wallet information, autofill entries, clipboard data, and system configuration details. Cyderes also reported observing alternative payloads delivered through the same loader infrastructure, including Rhadamanthys stealer, Async RAT, and XWorm. These programs are capable of credential theft and, in some cases, remote system control, enabling attackers to monitor activity or manipulate infected devices. The investigation identified one distribution source, dodi-repacks[.]site, as hosting downloads containing the embedded malware. The domain has previously been associated with other malicious distribution activity. Detection remains limited at the initial infection stage. Public scan results from Google’s VirusTotal platform indicate that, aside from Avast, AVG, and Cynet, most antivirus engines currently do not flag the loader component as malicious. This detection gap increases the likelihood that users may remain unaware of compromise. Users who suspect infection are advised to run updated security scans immediately. If concerns persist, Windows System Restore may help revert the device to a prior clean state. In cases where compromise cannot be confidently removed, a full operating system reinstallation may be necessary. The findings reinforce a recurring cybersecurity risk: unauthorized software downloads frequently serve as a delivery channel for concealed malware capable of exposing personal data and granting attackers extended access to victim systems.

Windows Malware Distributed Through Pirated Games Infects Over 400,000 Systems #Avast #malware #PCGames

0 0 0 0

Avast Ransomware Shield - (Explained by the Avast Bears!)
#bob3160 #RansomwareShield #Ransomware #Security #FamilyPhotos #Antivirus #Protection #Safety #Tech #Potatosecurity #Privacy #Avast youtube.com/shorts/A9aEA...

0 0 0 0
Avast Ransomware Shield - (Explained by the Avast Bears!)
Avast Ransomware Shield - (Explained by the Avast Bears!) YouTube video by Norbert “Bob” Gostischa

Avast Ransomware Shield - (Explained by the Avast Bears!)
#bob3160 #RansomwareShield #Ransomware #Security #FamilyPhotos #Antivirus #Protection #Safety #Tech #Cybersecurity #Privacy #Avast youtube.com/shorts/A9aEA...

0 0 0 0
Avast Scam Guardian - (Explained by the Avast Bears!)
Avast Scam Guardian - (Explained by the Avast Bears!) YouTube video by Norbert “Bob” Gostischa

Avast Scam Guardian - (Explained by the Avast Bears!)
#bob3160 #ScamGuardian #Security #MobileSafety #Fraud #Antivirus #Protection #Safety #Tech #Cybersecurity #Privacy #Avast youtube.com/shorts/Zz8Ri...

0 0 0 0
Post image



#Antivirus #Norton #360 #Deluxe #Avast #One #Gold #Trend #Micro #Maximum #Security

Origin | Interest | Match

0 0 0 0
Post image



#Security #Avast #One #Gold #Trend #Micro #Maximum #Security #Guide #ESET #Home

Origin | Interest | Match

0 0 0 0
Avast BreachGuard - (Explained by the Avast Bears!)
Avast BreachGuard - (Explained by the Avast Bears!) YouTube video by Norbert “Bob” Gostischa

Avast BreachGuard - (Explained by the Avast Bears!)

#bob3160 #BreachGuard #IdentityTheft #Privacy #Security #DataLeak #Passwords #DarkWeb #Antivirus #Safety #Cybersecurity #Avast youtube.com/shorts/zKUA7...

0 0 0 0
Avast Cleanup - Explained by the Avast Bears!
Avast Cleanup - Explained by the Avast Bears! YouTube video by Norbert “Bob” Gostischa

Avast Cleanup - (Explained by the Avast Bears!)
#bob3160 #Cleanup #Speed #Performance #Optimizing #Antivirus #Maintenance #Safety #Tech #Cybersecurity #Optimization #Avast youtube.com/shorts/SUXLw...

0 0 0 0
Is Coffee Shop Wi-Fi Safe - (Explained by the Avast Bears!)
Is Coffee Shop Wi-Fi Safe - (Explained by the Avast Bears!) YouTube video by Norbert “Bob” Gostischa

Is Coffee Shop Wi-Fi Safe - (Explained by the Avast Bears!) Is Coffee Shop Wi-Fi Safe - (Explained by the Avast Bears!)

#bob3160 #VPN #WiFi #Security #Privacy #Encryption #Safety #Travel #Tech #Cybersecurity #Protection #Avast youtube.com/shorts/zMKiX...

0 0 0 0