Anydesk Software Exploited to Spread Babuk Ransomware

We generally see that ransomware attacks are deployed through exploits, unsolicited malicious emails (malspam), or malicious Microsoft Office…

Stay Alert – Malware Authors Deploy ELF as Windows Loaders to Exploit WSL feature

What is WSL? The Windows Subsystem for Linux (WSL) is a resource inside the Windows operating system that…

CetaRAT APT Group – Targeting the Government Agencies

CetaRAT was seen for the first time in the Operation SideCopy APT. Now it is continuously expanding its…

What you need to know about the BazarLoader Malware?

At the start of February 2021, Bazarloader malware was in the news about its mechanism of delivering the…

FormBook Malware Returns: New Variant Uses Steganography and In-Memory Loading of multiple stages to steal data

Quick Heal Security Lab has seen a sudden increase in dotnet samples which are using steganography. Initially, in…

WARZONE RAT – Beware Of The Trojan Malware Stealing Data Triggering From Various Office Documents

Warzone RAT is part of an APT campaign named “Confucius.” Confucius APT is known to target government sectors…

Phishing Scam Alert: Domain Name Expiration Notices stealing data through phishing site

Have you received an email notification that your domain is about to expire? Most website owners have. But…

Google Play store applications laced with Joker malware yet again

For the last three years, Joker Trojan is making its way on Google Play Store. Quick Heal Security…

Fresh Joker Malware Variant Targeting Android Users

Cobalt Strike 2021 – Analysis of Malicious PowerShell Attack Framework

Cobalt Strike is a widespread threat emulation tool. It is one of the most powerful network attack tools…

Ficker – An Info-Stealer Malware that tricks people to get their passwords

Credential stealer malware is the most prevalent types of malware used in cyber-attacks. We have seen a lot…

Ficker Stealer Malware tricks people into getting passwords