Blog

Malware

Top 10 Malware Families (Mobile) of 2011

 December 31, 2011

Estimated reading time: 2 minutes

Today is the last day of the year and the right time to list out the top 10 Android Malware of this year. Below list is based on our report which is generated from the automated feedback that we collect from Quick Heal installations across India. Top 10 Malware Families...

Phone Text Message Lottery Scam

 November 23, 2011

Estimated reading time: 2 minutes

It is seen that Advance-Fee Fraud i.e. a confidence trick to earn money is being used by scammers sending phone text (SMS) messages as a means of tricking new victims. These text messages claim that the recipient has won a substantial sum of money in an online lottery as shown...

Microsoft announces workaround for the Duqu exploit

 November 5, 2011

Estimated reading time: 1 minute

Microsoft has posted a security advisory 2639658 to address the recently disclosed Windows kernel vulnerability (CVE-2011-3402) exploited by the Duqu malware. Microsoft has determined the flaw is in the processing of embedded True Type Fonts (TTFs). According to Microsoft: “The attacker could then install programs; view, change, or delete data;...

Surfing the Internet the secure way with browser sandbox

  • 1
    Share
 November 1, 2011

Estimated reading time: 2 minutes

PC’s today are mostly victims of infections caused by visiting infected websites that drop malware codes. Even though we have website reputation checks implemented by all anti-malware software, there is always a slight chance that the user may visit a newly infected website that has not yet been classified as...

“Battery Doctor” Android Scareware

 October 24, 2011

Estimated reading time: 2 minutes

A new “scareware” targeting mobile devices running Google’s Android operating system claims that it has the ability to recharge the battery, but in reality it is designed to steal information. When the program first executes, the overview window shown below appears. As you can see, it shows information about the...

New Twitter phishing attack

 October 19, 2011

Estimated reading time: 2 minutes

A Twitter phishing attack is spreading rapidly today and is attempting to obtain Twitter login details via Direct Messages. If you receive a message – “Found a funny picture of you!” which is linked to a website called “mugweb.ru”, do not click on the link. Clicking the link takes you...

Netflix application looks alike Android Malware

 October 17, 2011

Estimated reading time: 2 minutes

We have received a new malicous Android malware which looks like a genuine Netflix application and which can be used to steal Netflix account information. This is a classic case of trojanzied malware wherein the fake application, which is identical to the genuine application, lures users to enter their Netflix...

Malicious QR code used for spreading Android malware

 October 7, 2011

Estimated reading time: 2 minutes

Android malware writers have found a new and convenient way of delivering malware to users. This method makes use of malicious QR codes. QR (Quick Response) codes are a type of matrix barcode which contains encoded forms of data. They can also be used to store URL information. Most people...

Microsoft Kills Off a Botnet!

 October 4, 2011

Estimated reading time: 1 minute

In the battle against Internet Scammers, Microsoft opened a new front using the power of a U.S. court to deal a knockout blow to an emerging botnet and taking a provider of free Internet domains offline. Microsoft got the order from the U.S. District Court for the Eastern District of...

Worm Morto Spreading via RDP

 September 1, 2011

Estimated reading time: 1 minute

Our research team came across a Worm file, which upon execution wriggles its way through the systems using the RDP port. This worm is known as Morto and it is spreading very quickly in the wild. Morto uses the RDP (Remote Desktop protocol) to connect to a remote system and...