Blog
Quick heal blog

Malspam email – Jack of all malware, master of none.

  • 1
    Share
 January 21, 2019

Estimated reading time: 4 minutes

Malspam email or malicious spam emails are considered to be one of the favorite malware delivery channels for the attackers to deliver the malware to targeted victims. Attackers also run spam email campaigns to distribute their malware to a large number of users. For attackers to succeed, two things are...

Drone Safety – Flying Tips, Policies & Regulations

 January 15, 2019

Estimated reading time: 3 minutes

Drones Unmanned Aircraft System (UAS)/ Remotely Piloted Aircraft System (RPAS) commonly known as drones/ UAV are unmanned aerial vehicle without a human pilot aboard. The potential of drones is starting to be realized and it is making a big impact. They can take on complex tasks and reduce costs minimizing...

Applying Deep Learning for PE-Malware Classification

  • 1
    Share
 January 10, 2019

Estimated reading time: 5 minutes

Deep Learning & Computer vision techniques are making progress in every possible field. With growing computing powers many organizations use them to resolve or minimize many day-to-day problems. In a recent talk at AVAR 2018, Quick Heal AI team presented an approach of effectively using Deep Learning for malware classification....

Ransomware displaced by cryptojacking as the most trending cyberthreat but it is not dead yet

  • 34
    Shares
 January 9, 2019

Estimated reading time: 2 minutes

For those of you who have experienced the worst of Ransomware attacks in the form of WannaCry and Petya and believe that the worst is over; you never know what may await you on the other side of this New Year. While the recent threat analysis reports by Quick Heal...

Beware! Your website might be delivering Emotet malware

  • 17
    Shares
 December 29, 2018

Estimated reading time: 11 minutes

In 2018, we saw a surge in Emotet activity. Emotet started as a banking trojan but this blog will shed light on how it has also become a “threat distributor”. We will also discuss server-side and client-side activity and how it spreads. Its self-propagation makes it all the more challenging...

Beware!! PDF Attachments Launching Android malware

  • 27
    Shares
 December 25, 2018

Estimated reading time: 4 minutes

As a normal user we receive multiple emails on a daily basis with PDF as an attachment. Recently, at Quick-Heal Security Lab, we observed a malicious PDF file sent to users as an attachment via a phishing mail. These PDF files look like a regular document but that’s not the...

FakeApp discovered on Google Play Store which increases download count and rating of other applications.

  • 3
    Shares
 December 21, 2018

Estimated reading time: 3 minutes

Quick Heal Security Lab has spotted few FakeApps with more than 50,000+ installations on Google Play Store. These applications appear to be genuine as a PDF reader, PDF Downloader, PDF Scanner etc., but don’t have such functionality. The main purpose of these apps is to increase the download count of...

GandCrab says, “We will become back very soon! ;)”

 December 18, 2018

Estimated reading time: 5 minutes

GandCrab has been in the wild since last week of January 2018. Over the period it kept learning from its mistakes and GandCrab’s agile development grabbed the attention of many security researchers. From moving its servers to Namecoin powered Top Level Domain (.BIT TLD) servers after the first breach, then learning from...

Stay alert when planning your travels this holiday season

  • 14
    Shares
 December 18, 2018

Estimated reading time: 2 minutes

Planning a trip this holiday season? While, you spend a considerable amount of time shuffling money on online bookings for flights, hotels and cabs, take care that you DO NOT share your details on doubtful looking travel sites. Just like holidays are a busy time for you and me, it’s...

Ghost Has Arrived

 December 14, 2018

Estimated reading time: 5 minutes

On the back of an upswing in Ransomware activity, we decided to carry out an in-depth analysis of Ghost Ransomware. Interesting fact about this malware is that it uses multiple components to encrypt user files. Technical Analysis : Main malware executable (Ghost.exe) is compiled using the DotNet Framework. The infection...