Blog

January 2018

WhatsApp Scam Alert! Do not be fooled by this new scam

  • 1
    Share
26
WhatsApp_Scam_Alert

Estimated reading time: 1 minute

This is a quick advisory to warn our readers about a new WhatsApp scam that is afoot. In this scam, a fake message is getting circulated which informs a user that their WhatsApp subscription has expired and that they can buy a lifetime service just for 99p by clicking on...

New fake resume email campaign infecting users with the SmokeLoader malware

  • 22
    Shares
1 Comment

Estimated reading time: 4 minutes

Email attachments are a favorite medium for attackers to deliver malware. They can be used to target a specific user or multiple users at the same time by launching spam email campaigns. To succeed in carrying out an intended malware attack, it is necessary that recipients of the malicious email...

On Data Privacy Day, here are 10 simple tips to keep your data safe

  • 231
    Shares
39

Estimated reading time: 4 minutes

Recognized annually on January 28th, Data Privacy Day is defined as a centered approach towards respecting privacy, safeguarding data, and enabling trust. It is a global effort to raise and promote awareness around protecting one’s data and privacy. With this thought in mind, we have put together these 10 tips...

In-browser Cryptojacking at full throttle – A report by Quick Heal Security Labs

  • 27
    Shares
1 Comment

Estimated reading time: 4 minutes

Cryptocurrencies like Bitcoin, Monero, Ethereum, Litecoin, and Tezos are in full swing. And they have exponentially increased cryptocurrency mining (or cryptomining) activities. Previously, cryptomining was carried out by powerful and dedicated mining hardware or by utilizing distributed computing because the entire process requires a lot of computation. However, there has been an observable change in the mining trends. Now, web browsers are taking part in cryptomining and its activity is growing because...

Beware of fake cryptocurrency mining apps – a report by Quick Heal Security Labs

  • 34
    Shares
0

Estimated reading time: 4 minutes

Cryptocurrency has become a famous and valuable digital asset. One of the ways to earn cryptocurrencies is to mine them. New coins are generated and brought into the market through the process of mining. Mining of cryptocurrency is a resource-intensive task but mining them on mobile devices is still a...

Scam Alert! Beware of online surveys promising free iPhone X

  • 3
    Shares
2

Estimated reading time: 3 minutes

Ever came across an online survey that promised you a handsome prize? I did. And here’s what happened. While I was going about my daily work on the Internet, I came across the below page.   As you can see, I received a congratulatory message for being a loyal Google...

Quick Heal thwarts attempts of a JAVA jRAT phishing campaign targeting an international embassy in India

  • 35
    Shares
0

Estimated reading time: 4 minutes

Earlier we had blogged about how JAVA based jRAT malware were evolved in the recent times. At Quick Heal Security Labs, we are actively observing jRAT campaigns happening in the wild. These JAVA malware spread through phishing campaigns. While analyzing one such phishing campaign, we found that an International embassy in India was being targeted by phishers. The malware used in the phishing campaign was the infamous JAVA malware called jRAT. ...

Virus Infectors: a perpetual attack vector – A report by Quick Heal Security Labs

1 Comment

Estimated reading time: 5 minutes

2017 was the year of ransomware and cryptocurrency miners but we are still seeing infectors posing as a prominent attack vector. However, old infectors still remain a significant threat to users. In 2017, we observed a few old infector families making new versions of their old code, though no new...

Chrome extensions exploited in a massive PUA campaign

  • 39
    Shares
1 Comment

Estimated reading time: 4 minutes

Browser extensions also known as add-ons or plug-ins are programs that extend the functionality of a web browser making it more convenient to use and giving a better browsing experience. Browser extensions are commonly used to Enhance the appearance as per convenience Add to the functionality of the browser Incorporate...