Blog

February 2018

MIRUS – a cryptomining virus

  • 44
    Shares
0

Estimated reading time: 4 minutes

Cryptocurrencies are all the vogue now. This has resulted in the emergence of increasing cryptocurrency mining activities. Several platforms make mining services available to users. One such platform that provides JavaScript cryptocurrency miners for websites is CoinHive. Recently, we have analyzed a virus that infects user files with mining scripts. CoinHive is...

INFOGRAPHIC: Quick Heal Annual Threat Report 2018 | Key Findings

  • 2
    Shares
1 Comment

Estimated reading time: 1 minute

The Quick Heal Annual Threat Report 2018 is up and it puts together information that concerns individuals and business owners alike. It gives an insight into how the cybersecurity landscape shaped up in 2017 and how it is going to be in 2018. This infographic presents a quick overview of...

Thanatos Ransomware – an analysis by Quick Heal Security Labs

  • 17
    Shares
0

Estimated reading time: 2 minutes

Quick Heal Security Labs has come across a new ransomware with AES encryption technique that demands 0.01 Bitcoin as a ransom after encrypting the victim’s files. It’s known as Thanatos Ransomware. Thanatos is a type of a Trojan malware that spreads through malicious advertisements, phishing sites, spam emails, freeware and...

New Saturn Ransomware offers ransomware-as-a-service

  • 22
    Shares
0

Estimated reading time: 4 minutes

Quick Heal Security Labs has come across a new ransomware called ‘Saturn’ currently doing the rounds which upon encryption appends “. Saturn” extension to the encrypted files.  Behaviour of Saturn Ransomware Upon arrival on the host machine, Saturn ransomware checks whether it is a virtual environment or has any debuggers....

A massive security flaw discovered in Skype. Fix not coming anytime soon.

  • 18
    Shares
1 Comment

Estimated reading time: 2 minutes

Quick Heal Security Labs has recently learned about a serious vulnerability in Skype’s update installer – that’s the bad news. The worse news is, Microsoft is not going to patch the vulnerability anytime soon as this would require the updater to go through a ‘large code revision’. What is this...

Vulnerabilities found in Broadcom Wi-Fi adapter of Lenovo laptop chipsets

  • 32
    Shares
1 Comment

Estimated reading time: 2 minutes

Lenovo recently released an advisory, warning customers about two critical Broadcom vulnerabilities which impact 25 models of its popular ThinkPad lineup. The Broadcom Wi-Fi chipsets used by Lenovo ThinkPad devices are affected by the CVE-2017-11120 & CVE-2017-11121 vulnerabilities. Both these issues are rated as “critical” and received a CVSS 10 score...

Beware of the WhatsApp scam that promises free Adidas shoes!

  • 99
    Shares
50

Estimated reading time: 3 minutes

So, this other day I get a forwarded message from a friend early in the morning. I thought it was the usual good morning message but it was not and read as follows: “Adidas is giving away 3000 Free Pair of Shoes to celebrate its 93rd anniversary. Get your free...

The Runner: a key component of the SamSam ransomware campaign – An analysis by Quick Heal Security Labs

0

Estimated reading time: 4 minutes

In Jan 2018, Greenfield, Indiana-based Hancock Health (healthcare network) was attacked by SamSam ransomware. It encrypted the files containing patients’ data which disrupted their critical services. Even though SamSam is not a new ransomware, it has evolved over a period of time. We had observed its first variant in Feb...

An analysis of an MS office document exploiting a zero-day flash player vulnerability (CVE-2018-4878)

0

Estimated reading time: 3 minutes

Important update! Adobe Systems released a critical security update on 6.02.2017 to fix the vulnerability discussed in this post. We recommend you to apply the update immediately. Summary of the vulnerability CVE-2018-4878 is a use-after-free vulnerability present in Adobe Flash Player 28.0.0.137 and its earlier versions are being exploited in...

How to detect and remove the bitcoin miner malware

  • 25
    Shares
2

Estimated reading time: 3 minutes

This article aims to help you detect and remove the newly emerged fileless bitcoin miner malware and protect your computer. Bitcoin is a digital cash system. The difference between using bitcoin and using regular money is that bitcoins can be used without having to link any sort of real-world identity...