Estimated reading time: 3 minutes
A new variant of the Dharma ransomware (‘.arrow’) has been observed in the wild. This variant appends the extension ‘.arrow’ to the files it encrypts and spreads via spam emails. How Dharma encrypts its victim’s files Once executed, the ‘.arrow’ variant of Dharma uses the below command to disable...Estimated reading time: 2 minutes
Spyware refers to software that spy on your Internet browsing activities, record keystrokes, and collect almost any type of data including your personal information such as credit/debit card or banking details, login IDs and passwords. In this post, we share 8 tips to avoid a spyware attack and keep your...Estimated reading time: 3 minutes
One of the oldest, nastiest and most lucrative tools used by hackers is phishing – a method to fool you into revealing your personal and sensitive information such as debit/card numbers, passwords, ATM pin, date of birth – any data that can personal identify you. Here’s an example of a...Estimated reading time: 2 minutes
Do you find it convenient to shop and bank online using mobile payment apps? Most would have ‘yes’ as an answer. But, are we letting ‘convenience’ overshadow ‘security’? An attacker can easily get hold of your personal and banking information if the app or the mobile site you are using...Estimated reading time: 4 minutes
WhatsApp currently has over 200 million monthly active users in India. No wonder it has become a popular tool for scammers. Just last night, I received the following message from one of my friends on WhatsApp. Fig 1 The message is in Hindi and loosely translates to this… Open this...Estimated reading time: 5 minutes
Last week, we had blogged about the emergence of a new attack vector ‘.url’ which is used to spread malware. In this blog post, we will deep-dive into the attack chain of this ‘.url’ vector and elaborate on the Quant Loader malware which is actively making use of it. Let’s...Estimated reading time: 4 minutes
Quick Heal Security Labs has come across a new ransomware that goes by the name ‘Zenis’. The ransomware not only encrypts files but also intentionally deletes the infected system’s backup. The behavior of Zenis ransomware Upon inside a computer, the ransomware performs the following checks before it starts encrypting...