Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Researchers Warn CypherLoc Scareware Has Targeted Millions of Users

May 20, 2026

Mini Shai-Hulud Worm Compromises TanStack, Mistral AI, Guardrails AI & More Packages

May 20, 2026

Hackers Bypass Security Tools to Target Users Directly

May 20, 2026
Facebook X (Twitter) Instagram
Wednesday, May 20
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Researchers Warn CypherLoc Scareware Has Targeted Millions of Users
News

Researchers Warn CypherLoc Scareware Has Targeted Millions of Users

Team-CWDBy Team-CWDMay 20, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Security researchers have sounded the alarm over new scareware designed to lock users’ browsers and drive them to fraudulent tech support teams.

Since the start of 2026, Barracuda researchers said they have observed around 2.8 million attacks which used the scareware dubbed CypherLoc.

According to the cybersecurity firm, the CypherLoc campaign usually begins with a phishing email that directs the victim to a malicious web page through a link embedded in the email or in an attachment.

A harmless malicious web page is loaded, only triggering the full scareware environment if several conditions are met.

“The code only decrypts when the page is opened under the right conditions: when the required URL fragment hash is present and the page passes a series of cryptographic integrity checks,” Barracuda explained in an article. 

“If the hidden fragment is missing or the page is being opened in a scanner, sandbox or test environment, the malicious payload refuses to run, and the page redirects to a blank screen. This hides the attack from security tools.”

Read more on scareware: Fake Obituary Sites Send Grievers to Porn and Scareware Pages

What follows is a series of actions designed to discomfort the user:

  • The browser switches to full-screen mode, disabling context menus, hiding the cursor, and flooding the screen with overlays
  • Any attempt to regain control triggers a “relock”
  • A fake security page plays warning sounds whenever the user clicks
  • This extra activity might slow the browser or cause it to crash
  • CypherLoc retrieves and displays the user’s IP address
  • A login popup is show to the user which escalates the sense of panic when it doesn’t work

“A fraudulent support phone number is prominently displayed on the screen throughout the attack and presented as the only way to fix the problem,” Barracuda continued. “When victims call the number, human operators posing as Microsoft support staff take over and continue the scam via a live conversation.”

It’s not immediately clear what the end goal is, although credential theft is one option.

How to Tackle Scareware

“CypherLoc shows how modern scareware is shifting away from obvious malware and towards browser-based, user-driven scams that are difficult to detect and highly effective,” said  Saravanan Mohankumar, manager, threat analysis team at Barracuda.

“It uses the browser itself to pressure victims into acting. By combining hidden code, delayed activation and aggressive on-screen behaviour, it creates a convincing illusion of a serious system problem while leaving very little technical trace.”

Barracuda recommended that corporate security teams put in place anti-phishing, browser and endpoint protections to detect and block suspicious script behavior. And to ensure users are educated about such threats.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleMini Shai-Hulud Worm Compromises TanStack, Mistral AI, Guardrails AI & More Packages
Team-CWD
  • Website

Related Posts

News

Mini Shai-Hulud Worm Compromises TanStack, Mistral AI, Guardrails AI & More Packages

May 20, 2026
News

Hackers Bypass Security Tools to Target Users Directly

May 20, 2026
News

Why Agentic AI Is Security’s Next Blind Spot

May 20, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Target Crypto Firms with ClickFix and Zoom Lures

April 29, 202610 Views

Why SOC Burnout Can Be Avoided: Practical Steps

November 14, 20259 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Target Crypto Firms with ClickFix and Zoom Lures

April 29, 202610 Views
Our Picks

The WhatsApp screen-sharing scam you didn’t see coming

November 6, 2025

Your information is on the dark web. What happens next?

January 13, 2026

What are brushing scams and how do I stay safe?

December 24, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.