Blog

Security

Emerging trend of spreading malware through IQY files

 October 3, 2018

Estimated reading time: 4 minutes

Nowadays attackers are searching for new techniques to spread malware, recently we came across a new emerging way to deliver malware through IQY file. Till now we had seen spread of malware through various file types and chains such as Word document, Script, JAVA files. Fig 1: Attack chain IQY file...

Beware of cyber attacks this holiday season!

  • 25
    Shares
 September 17, 2018
holiday-scam

Estimated reading time: 3 minutes

With a range of festivals throughout the festive months, this is truly a time of celebration and joy as people come together. Whether it is Ganesh Chaturthi, Durga Puja, Diwali or Christmas, people everywhere are in a merry mood, spending time with their families and friends. These festive times also...

CVE-2018-8440 – Task Scheduler ALPC Zero-Day Exploit in the Wild

  • 13
    Shares
 September 12, 2018

Estimated reading time: 1 minute

The recent zero-day vulnerability CVE-2018-8440 in Windows Task Scheduler enables attackers to perform a privilege elevation on targeted machines. Microsoft has released a security advisory CVE-2018-8440 on September 11, 2018 to address this issue. According to Microsoft, successful exploitation of this vulnerability could run arbitrary code in the security context...

I am invisible – Monero (XMR) Miner

  • 43
    Shares
 September 3, 2018

Estimated reading time: 4 minutes

From the last one year, Quick Heal Security Labs has been observing a boost in the number of mining malware. Nowadays malware authors are using mining as a replacement for Ransomware to make money. Recently Quick Heal Security Labs came across a malware which mines Monero(XMR). This miner has many...

Cryptocurrency miner hits IoT devices, mostly affects Brazil and Russia!

  • 21
    Shares
 August 9, 2018

Estimated reading time: 3 minutes

According to a blogpost published on Aug 1, 2018, 200,000 routers in Brazil were compromised to deliver Cryptocurrency mining scripts to mine Monero (XMR) cryptocurrency. Hackers compromised the vulnerable MikroTik routers by injecting CoinHive scripts into the routers web pages in order to carry out the mass Cryptocurrency miner attack....

Beware of the Armage Ransomware – the File Destroyer!

  • 18
    Shares
 August 8, 2018

Estimated reading time: 3 minutes

In July last week, Quick Heal Security Labs detected a new ransomware called Armage. It appends ‘.Armage’ extension to files it encrypts. Armage ransomware uses the AES-256 encryption algorithm to encode files making them inoperable. It spreads via spam emails and corrupted text files. Technical analysis Once executed on the...

Beware of the ‘Free Cycle Distribution Yojana’ WhatsApp message. It’s fake!

  • 93
    Shares
 July 30, 2018

Estimated reading time: 3 minutes

As India’s Independence Day (15th of August) approaches, messages about free distribution schemes are doing the rounds on WhatsApp. Just recently, Quick Heal Security Labs detected a widespread circulation of one such message claiming that the Indian government will distribute free cycles to students on Independence Day, under the Free...

The evolution of a 4-year-old-threat Emotet: From an infamous Trojan to a complex threat distributer

  • 15
    Shares
 July 25, 2018

Estimated reading time: 6 minutes

Emotet malware campaign has been existing for a long time. It comes frequently in intervals with different techniques and variants to deliver malware on a victim. Attackers are smart and they use complex techniques to avoid detection. At the start of 2017, we had seen the emotet campaign spreading through...

Your copy-paste habit can cost you your money

  • 20
    Shares
 July 19, 2018

Estimated reading time: 4 minutes

How often do you store your important data in files? It’s very common, right? This data may be URLs, topics, personal data like contacts, email-ids, usernames of different portals and sometimes passwords too (though always recommended to not to do so). We very casually copy this data and paste it...

Cryptojacking is when someone illegally uses your PC to make digital money + 8 facts

  • 27
    Shares
 June 20, 2018

Estimated reading time: 4 minutes

What attracts more than a magnet? You might have guessed it right – it is money! And where there is easy money, there is a lot of hustle and bustle. Till now, ransomware was seen as the ultimate cash cow for attackers – kidnap critical data and ask a ransom...