GandCrab Riding Emotet’s Bus!

Credit to Author: Bajrang Mane| Date: Fri, 15 Feb 2019 10:03:57 +0000

Emotet Known for constantly changing its payload and infection vectors like spam mail, Malicious Doc and even Malicious JS files. It compromised a very high number of websites on the internet. Emotet malware campaign has existed since 2014. It comes frequently in intervals with different techniques and variants to deliver malware…

Read more

This Valentine fall for true love not for fake online dating apps

Credit to Author: Sushmita Kalashikar| Date: Thu, 14 Feb 2019 12:36:04 +0000

Valentine Day is that special time of the year when people are busy celebrating the essence of love. However, on the darker side, it is also a time when cyber criminals are looking to cash on your hunt for the love of your life. So, just in case you are…

Read more

28 Fake Apps removed from Google Play Store post Quick Heal Security Lab reports

Credit to Author: Gajanan Khond| Date: Thu, 07 Feb 2019 10:57:00 +0000

Quick Heal Security Lab has spotted 28 Fake Apps with over 48,000+ (all together) installations on Google Play Store. Google play has removed a total of 28 fake apps from the Play Store after reports by Quick Heal Security Lab. The apps do not have any legitimate functionality related to…

Read more

3 essential ways to strengthen your business data security

Credit to Author: Sushmita Kalashikar| Date: Tue, 05 Feb 2019 12:53:26 +0000

For any business big or small, business data is an asset that they cannot afford to compromise at any cost. With a huge amount of data, from employee details to the credit card details of customers, stored in the form of vulnerable electronic records, the loss of even a single…

Read more

Anatova, A modular ransomware

Credit to Author: Shriram Munde| Date: Tue, 29 Jan 2019 06:09:49 +0000

While everyone was engaged in new year celebrations, malware authors were busy creating new ransomware for 2019. Quick Heal Security Labs has discovered the first ransomware of 2019 — Anatova ransomware. During our analysis, we found that Anatova is not just ransomware but a modular one. By modular ransomware we…

Read more

Mongolock Ransomware deletes files and targets databases

Credit to Author: Shriram Munde| Date: Tue, 29 Jan 2019 05:30:20 +0000

Ransomware has become one of the most dangerous cyber-attack methods because of the different techniques it uses to encrypt the files and evade the detection of security software to earn money. Also, at a time, it’s not limited to encrypting user’s files but also deletes the files and formats the…

Read more

GandCrab Ransomware along with Monero Miner and Spammer

Credit to Author: Prashant Tilekar| Date: Thu, 24 Jan 2019 11:54:00 +0000

Recently we saw a new campaign through spam mail attachment- zip file. It contains JavaScript file which delivers a bundle of GandCrab Ransomware, Monero miner and Spammer. This bundle of multiple malware variants is nothing new, it is common for ransomware to be paired with miner and spammer. This type…

Read more

Malspam email – Jack of all malware, master of none.

Credit to Author: Shriram Munde| Date: Mon, 21 Jan 2019 07:37:49 +0000

Malspam email or malicious spam emails are considered to be one of the favorite malware delivery channels for the attackers to deliver the malware to targeted victims. Attackers also run spam email campaigns to distribute their malware to a large number of users. For attackers to succeed, two things are…

Read more

Drone Safety – Flying Tips, Policies & Regulations

Credit to Author: Sunita Saini| Date: Tue, 15 Jan 2019 04:09:29 +0000

Drones Unmanned Aircraft System (UAS)/ Remotely Piloted Aircraft System (RPAS) commonly known as drones/ UAV are unmanned aerial vehicle without a human pilot aboard. The potential of drones is starting to be realized and it is making a big impact. They can take on complex tasks and reduce costs minimizing…

Read more

Applying Deep Learning for PE-Malware Classification

Credit to Author: Ajay| Date: Thu, 10 Jan 2019 08:34:28 +0000

Deep Learning & Computer vision techniques are making progress in every possible field. With growing computing powers many organizations use them to resolve or minimize many day-to-day problems. In a recent talk at AVAR 2018, Quick Heal AI team presented an approach of effectively using Deep Learning for malware classification….

Read more

Ransomware displaced by cryptojacking as the most trending cyberthreat but it is not dead yet

Credit to Author: Sushmita Kalashikar| Date: Wed, 09 Jan 2019 10:23:23 +0000

For those of you who have experienced the worst of Ransomware attacks in the form of WannaCry and Petya and believe that the worst is over; you never know what may await you on the other side of this New Year. While the recent threat analysis reports by Quick Heal…

Read more