Blog

Malware

Your guide to new-age cybersecurity terms

 August 31, 2020

Estimated reading time: 2 minutes

Like every other sector, cybersecurity has its own lingo. Often, it can be difficult for us users to understand the nuances. If jargon and long lists of indecipherable acronyms are frustrating you, we’re here to keep you updated with the latest lingo in the cybersecurity world. Keep in mind though,...

Data Breach – Understanding the severity of it

Estimated reading time: 2 minutes

A data breach is a security gap in which information or data is accessed or stolen without authorization. It is a breach of trust between the owner of the data and the party that accesses it without consent. To put it in simpler terms it a nonconsensual usage of someone’s...

New malware via gaming portals may affect thousands of personal computers

 July 2, 2020

Estimated reading time: 2 minutes

Gamers beware. A report by Chinese cybersecurity researchers recently discovered a malicious botnet campaign that infected hundreds of thousands of systems. This botnet campaign was spread through malware via pirate gaming portals. The attack has been traced back to a China-based cybercrime group called DoubleGun which has amassed thousands of...

Are you sure you have the right Aarogya Setu App on your phone?

 May 27, 2020

Estimated reading time: 5 minutes

The Government of India launched a mobile application called Aarogya Setu for easy contact tracing of people during the Covid-19 pandemic. It has a record-breaking number of downloads in a very short span of time on Google Play Store. As per government stats, it has more than 10 crore registered...

CVE-2020-0796 – A “wormable” Remote Code Execution vulnerability in SMB v3

 March 13, 2020

Estimated reading time: 2 minutes

Since last two days, the Internet is rife with news around a critical remote code execution vulnerability in SMBv3.1.1 compression mechanism. Today, on 12th March 2020 Microsoft has released an emergency out-of-band patch to address this vulnerability. As per Microsoft release information, it’s a remote code execution vulnerability in the...

HorseDeal Riding on The Curveball!

 February 5, 2020

Estimated reading time: 5 minutes

It’s surprising to see how quickly attackers make use of new vulnerabilities in malware campaigns. Microsoft recently patched a very interesting vulnerability in their monthly Patch Tuesday update for January 2020. It’s a spoofing vulnerability in Windows CryptoAPI (Crypt32.dll) validation mechanism for Elliptic Curve Cryptography (ECC) certificates. An attacker could...

A sloppy click can exfiltrate your important data!

 February 3, 2020

Estimated reading time: 4 minutes

Phishing email still remains one of the top malware propagation medium. Recently, we came across an interesting phishing email containing couple of Jumpshare links pointing to malicious components. Jumpshare is an online file sharing service and often cyber criminals abuse these kind of file sharing services. Upon clicking on one of the links in...

New wave of Mal-Spam campaign attaching Disk Imaging Files

 January 24, 2020

Estimated reading time: 6 minutes

From past few months at Quick-Heal Labs, we have been observing a sudden rise in Spear Phishing mail containing distinct file formats as attachment like IMG, ISO, etc. These new types of attachments are mainly used to deploy some well-known and older Remote Access Trojans. The subject of these emails...

Ako Ransomware targeting businesses using RaaS

 January 24, 2020

Estimated reading time: 5 minutes

Ako Ransomware targeting businesses using RaaS Quick Heal security researchers recently observed ransomware that uses RaaS (Ransomware as a Service) which is a subpart of MaaS (Malware as a Service). Before delving into the AKO ransomware or RaaS, one must understand what Malware as a Service means, as it is...