Blog

Uncategorized

3 reasons you can’t live without your smartphone [VIDEO]

  • 1
    Share
 May 14, 2018
3_reasons_you_can't_live_without_your_smartphone

Estimated reading time: 1 minute

Can you think of 3 reasons why you can’t live without your smartphone? Well, we tried figuring out the answer to that in this short video of ours. We also tried thinking what would happen if something bad happens to your phone and how can you avoid it. So, do...

Dharma ransomware resurfaces with a new variant

  • 42
    Shares
 April 16, 2018

Estimated reading time: 3 minutes

A new variant of the Dharma ransomware (‘.arrow’) has been observed in the wild. This variant appends the extension ‘.arrow’ to the files it encrypts and spreads via spam emails.   How Dharma encrypts its victim’s files Once executed, the ‘.arrow’ variant of Dharma uses the below command to disable...

An analysis of the Zenis ransomware by Quick Heal Security Labs

 March 19, 2018

Estimated reading time: 4 minutes

Quick Heal Security Labs has come across a new ransomware that goes by the name ‘Zenis’. The ransomware not only encrypts files but also intentionally deletes the infected system’s backup.   The behavior of Zenis ransomware Upon inside a computer, the ransomware performs the following checks before it starts encrypting...

Email campaign using .url extensions to abuse Internet Explorer vulnerabilities (CVE-2016-3353)

  • 8
    Shares
 March 14, 2018

Estimated reading time: 4 minutes

In the wild, malspam campaigns are a major medium to spread malware. Previously, we have written about such campaigns using MS Office files with malicious macro and using vulnerabilities. Recently, we observed a spam campaign that uses .url files as a first-stage downloader to spread malware and bypass security features....

Beware! A new .Net Ransomware is encrypting files with .Lime

  • 37
    Shares
 March 6, 2018

Estimated reading time: 4 minutes

Cases of the “Lime ransomware” have been recently reported to Quick Heal Security Labs. Our research team has analyzed these cases deeply and found some useful information. This post shares this information to help users stay safe from ransomware attacks. ‘Lime’ is a newly discovered .net ransomware; it is also...

Thanatos Ransomware – an analysis by Quick Heal Security Labs

  • 17
    Shares
 February 22, 2018

Estimated reading time: 2 minutes

Quick Heal Security Labs has come across a new ransomware with AES encryption technique that demands 0.01 Bitcoin as a ransom after encrypting the victim’s files. It’s known as Thanatos Ransomware. Thanatos is a type of a Trojan malware that spreads through malicious advertisements, phishing sites, spam emails, freeware and...

New Saturn Ransomware offers ransomware-as-a-service

  • 22
    Shares
 February 19, 2018

Estimated reading time: 4 minutes

Quick Heal Security Labs has come across a new ransomware called ‘Saturn’ currently doing the rounds which upon encryption appends “. Saturn” extension to the encrypted files.  Behaviour of Saturn Ransomware Upon arrival on the host machine, Saturn ransomware checks whether it is a virtual environment or has any debuggers....

A massive security flaw discovered in Skype. Fix not coming anytime soon.

  • 16
    Shares
 February 14, 2018

Estimated reading time: 2 minutes

Quick Heal Security Labs has recently learned about a serious vulnerability in Skype’s update installer – that’s the bad news. The worse news is, Microsoft is not going to patch the vulnerability anytime soon as this would require the updater to go through a ‘large code revision’. What is this...

Beware of the WhatsApp scam that promises free Adidas shoes!

  • 99
    Shares
 February 12, 2018

Estimated reading time: 3 minutes

So, this other day I get a forwarded message from a friend early in the morning. I thought it was the usual good morning message but it was not and read as follows: “Adidas is giving away 3000 Free Pair of Shoes to celebrate its 93rd anniversary. Get your free...

New fake resume email campaign infecting users with the SmokeLoader malware

  • 22
    Shares
 January 29, 2018

Estimated reading time: 4 minutes

Email attachments are a favorite medium for attackers to deliver malware. They can be used to target a specific user or multiple users at the same time by launching spam email campaigns. To succeed in carrying out an intended malware attack, it is necessary that recipients of the malicious email...