Blog
Quick heal blog

“Troldesh’s” One More Variant in the Encryption Offender

  • 22
    Shares
 September 3, 2018

Estimated reading time: 4 minutes

Over the past few days, we have been observing criminals/hackers using a new carrier to deliver the ransomware malware. Recently, Quick Heal Security Labs observed a new variant of Troldesh ransomware which encrypts the data and adds the extension as “.no_more_ransom”. This ransomware comes under Crypto-Ransomware variant, the origin of this...

I am invisible – Monero (XMR) Miner

  • 43
    Shares
 September 3, 2018

Estimated reading time: 4 minutes

From the last one year, Quick Heal Security Labs has been observing a boost in the number of mining malware. Nowadays malware authors are using mining as a replacement for Ransomware to make money. Recently Quick Heal Security Labs came across a malware which mines Monero(XMR). This miner has many...

A new ransomware campaign in the wild,Ryuk!!

  • 21
    Shares
 August 28, 2018

Estimated reading time: 4 minutes

Recently, Quick Heal Security Labs observed a new destructive ransomware named ‘Ryuk. Ransomware’. This ransomware campaign has already affected many users worldwide and seems to be a spear phishing attack. The compelling thing, it encrypts victim files without appending any extension but making files unreadable. Ryuk uses robust military algorithms...

Be aware! Hiddad Malware present on Google Play Store.

  • 34
    Shares
 August 27, 2018

Estimated reading time: 3 minutes

Quick Heal Security Lab has spotted a couple of applications on play store which hide themselves after installation and display full screen ads after specific time interval. This trend is used by most of the developers these days to earn profit by displaying ads. Even if users want to uninstall...

Android malware that combines a Banking Trojan, Keylogger, and Ransomware in one package

  • 67
    Shares
 August 17, 2018

Estimated reading time: 8 minutes

This malware has all basic functionalities of the Android banker along with additional features like call forwarding, sound recording, keylogging and ransomware activities. It has the ability to launch user’s browser with URL received from the C&C server. It repeatedly opens the accessibility setting page until the user switches ON the ‘AccessibilityService’. The...

Again! A New .NET Ransomware Shrug2

  • 30
    Shares
 August 10, 2018

Estimated reading time: 5 minutes

For several months, Quick Heal Security Labs has been observing an increase in ransomware which are built in  .NET framework. Ransomware like SamSam, Lime and now Shrug was found to be built in .NET framework. Malware authors are finding it very easy to build and obfuscate malware in .NET framework rather than making them in...

Cryptocurrency miner hits IoT devices, mostly affects Brazil and Russia!

  • 21
    Shares
 August 9, 2018

Estimated reading time: 3 minutes

According to a blogpost published on Aug 1, 2018, 200,000 routers in Brazil were compromised to deliver Cryptocurrency mining scripts to mine Monero (XMR) cryptocurrency. Hackers compromised the vulnerable MikroTik routers by injecting CoinHive scripts into the routers web pages in order to carry out the mass Cryptocurrency miner attack....

Beware of the Armage Ransomware – the File Destroyer!

  • 17
    Shares
 August 8, 2018

Estimated reading time: 3 minutes

In July last week, Quick Heal Security Labs detected a new ransomware called Armage. It appends ‘.Armage’ extension to files it encrypts. Armage ransomware uses the AES-256 encryption algorithm to encode files making them inoperable. It spreads via spam emails and corrupted text files. Technical analysis Once executed on the...

Threats to your digital life are increasing. Are you doing anything about it?

  • 24
    Shares
 August 8, 2018

Estimated reading time: 2 minutes

It’s an exciting age to be alive! We are rapidly advancing towards greater heights of technology paying witness to inventions like the Internet of Things (IoT), Artificial Intelligence, Flying Cars, and the prospect of traveling to space as an excursion! The word ‘exciting’ fails to define these milestones mankind is...

Data Privacy. What is that?

  • 16
    Shares
 August 6, 2018

Estimated reading time: 2 minutes

With the heavy penetration of the Internet into almost every household, data privacy has had its day. The Facebook data leak scandal which rocked the tech industry is a blistering example of the way our privacy is getting compromised at the cost of our obsession with social networking or the...