9 things you must learn from the Quick Heal Quarterly Threat Report Q3 2017

Quick Heal Quarterly Threat Report

The Quick Heal Quarterly Threat Report is a detailed analysis of cybersecurity threats that prevail during a particular quarter affecting the Windows and Android platform. Our Q3 (July – September) Threat Report is up and here are the 9 important things that we must know.

#1. Quick Heal detected over 199 million malware samples on Windows.

#2. LNK.Browser.Modifier is the top Windows malware of Q3 2017: It’s a Trojan that injects malicious codes into the browser which redirects the user to malicious links.

#3. The Trojan family had the highest detection rate in Q3.

#4. Nine new ransomware families were detected.

#5. Quick Heal received over 2 million Android samples (Android samples are APK files – exhibiting malicious or suspicious behavior, received by Quick  Heal Security Labs from multiple sources). This figure is 40% higher than that received in the previous quarter Q2.

#6. In Q3 2017, PUA family (Potential Unwanted Programs) grew 238%.

#7. Quick Heal Detection


#8.Kolkata is the top city in the world to search for ‘blue whale challenge’. Learn more about this here:5 things parents must know about the Blue Whale Challenge.

#9. Trends and predictions for Windows and Android users

Windows Ransomware
• Newer and advanced variants of the Locky ransomware family are expected to rise.
• Ransomware-as-a-Service type attacks may increase due to its user-friendliness and high return on investment (ROI).
• Cryptomix and Cerber ransomware are expected to hit its targets with new variants and sophisticated propagation techniques.

Targeted Attacks
• Email attachments will be used largely to deliver malware to targeted users. These emails might use new file types for their attachments to avoid being detected by security software.
• We are observing more malware to be using Advanced Volatile Threats (AVTs) techniques for resilience. File-less malware are expected to add sophistication in their upcoming attacks.

Android vulnerabilities
• Malware authors can access a user’s device to gain almost anything they want by misusing critical vulnerabilities that are unpatched. Hence,
Android vulnerability becomes a major concern in the coming days. Blueborm & DirtyCow are the best examples.

PUA on the rise
• PUA has been growing rampantly this year. It consistently rose from Q1 (41%) to Q2 (51%) to Q3 (61%).
• We are expecting more malware threats will use PUA to target the Android community.

Download the full Quarterly Threat Report here:






Rajiv Singha

Rajiv Singha

No Comments, Be The First!

Your email address will not be published.