Encryption

Cerber Ransomware Exposed: A Comprehensive Analysis of Advanced Tactics, Encryption, and Evasion

Cerber is a strain of ransomware that was first identified in early 2016. It is a type of…

White Snake Menace: The Growing Threat of Information Stealers in the Cybercrime Landscape

Introduction The rise of malicious software designed to steal sensitive information has become a significant problem in the…

A DEEP DIVE INTO NEW 64 BIT EMOTET MODULES

Emotet is usually delivered by SPAM campaigns containing document files. This self-propagating Trojan is a downloader malware that…

New 64 BIT Emotet Modules

PowerShell: An Attacker’s Paradise

  PowerShell was originally intended as a task automation and configuration management program for system administrators. However, it…

POWERSHELL: AN ATTACKER’S PARADISE

Ouroboros: Following A New Trend In Ransomware League

Ransomware authors keep exploring new ways to test their strengths against various malware evasion techniques. The ransomware known…

A Deep Dive Into Wakeup On Lan (WoL) Implementation of Ryuk

Quick Heal Security Labs recently came across a variant of Ryuk Ransomware which contains an additional feature of…

HorseDeal Riding on The Curveball!

It’s surprising to see how quickly attackers make use of new vulnerabilities in malware campaigns. Microsoft recently patched…

Ako Ransomware targeting businesses using RaaS

Ako Ransomware targeting businesses using RaaS Quick Heal security researchers recently observed ransomware that uses RaaS (Ransomware as…

First Node.js-based Ransomware : Nodera

Recently while threat hunting, Quick Heal Security Labs came across an unusual Node.js framework based on Nodera ransomware….

STOP (Djvu) Ransomware: Ransom For Your Shady Habits!

With almost 200 extensions, STOP (djvu) ransomware can be said to be 2019’s most active and widespread ransomware….