Skip to content (Press Enter)
  • Personal
    • Secure Hunter FREE
    • Secure Hunter PRO
    • Secure Hunter Beta
    • Secure Hunter Error Code
    • More Free Tools
      • Secure Hunter Anti-Theft Android App
      • Secure Hunter NetstatWrapper
  • Secure Hunter Business
    • Small Business
    • Secure External Removal
    • Webmaster Tool Kit
  • Support
    • Knowledge Base
    • Community
    • Secure Hunter F.A.Q.
    • Cyber Security Glossary
    • Consulting
    • Partners
  • Affiliates
    • Secure Hunter Resellers
  • Company
    • About Us
    • Career Opportunities
    • Testimonials
    • Contact
    • Sitemap
  • Blog
Secure Hunter Free Anti Malware Software

Secure Hunter Anti-Malware

Secure your data and hunt dangerous threats

  • Personal
    • Secure Hunter FREE
    • Secure Hunter PRO
    • Secure Hunter Beta
    • Secure Hunter Error Code
    • More Free Tools
      • Secure Hunter Anti-Theft Android App
      • Secure Hunter NetstatWrapper
  • Secure Hunter Business
    • Small Business
    • Secure External Removal
    • Webmaster Tool Kit
  • Support
    • Knowledge Base
    • Community
    • Secure Hunter F.A.Q.
    • Cyber Security Glossary
    • Consulting
    • Partners
  • Affiliates
    • Secure Hunter Resellers
  • Company
    • About Us
    • Career Opportunities
    • Testimonials
    • Contact
    • Sitemap
  • Blog
Home>Secure Hunter Blog>Anti-Malware News>Google ad for GIMP.org served info-stealing malware via lookalike site
November 1, 2022November 1, 2022/ james

Google ad for GIMP.org served info-stealing malware via lookalike site

Anti-Malware News

Searching for ‘GIMP’ on Google as recently as last week would show visitors an ad for ‘GIMP.org,’ the official website of the well known graphics editor, GNU Image Manipulation Program. But clicking on it drove visitors to a lookalike phishing website that provided them with a 700 MB executable disguised as GIMP which was malware. […]

Post Navigation

Prev PostMozilla Firefox fixes freezes caused by new Windows 11 feature
Next PostMicrosoft fixes critical RCE flaw affecting Azure Cosmos DB

You may also like...

Microsoft Exchange server zero-day mitigation can be bypassed

Microsoft Exchange server zero-day mitigation can be bypassed

Minecraft rushes out patch for critical Log4j vulnerability

Minecraft rushes out patch for critical Log4j vulnerability

ProtonVPN causes Windows BSOD crashes due to antivirus conflicts

ProtonVPN causes Windows BSOD crashes due to antivirus conflicts

LockBit ransomware gang gets aggressive with triple-extortion tactic

LockBit ransomware gang gets aggressive with triple-extortion tactic

Popular Posts

Best free antispyware

Best free antispyware

Researchers to release VMware vRealize Log RCE exploit, patch now

Researchers to release VMware vRealize Log RCE exploit, patch now

Cloud Topology- sense of alluring

Cloud Topology- sense of alluring

How to Find the Best Malware Removal Tool?

How to Find the Best Malware Removal Tool?

PRESS

fox news CBS news

Latest News

  • Researchers to release VMware vRealize Log RCE exploit, patch now
  • Hackers use new SwiftSlicer wiper to destroy Windows domains
  • The Week in Ransomware – January 27th 2023 – ‘We hacked the hackers’

AWARDS

Copyright © 2023 Secure Hunter Anti-Malware. Software Company | Developed By Rara Theme. Powered by WordPress.