Android malware that combines a Banking Trojan, Keylogger, and Ransomware in one package

Credit to Author: Gajanan Khond| Date: Fri, 17 Aug 2018 14:12:09 +0000

This malware has all basic functionalities of the Android banker along with additional features like call forwarding, sound recording, keylogging and ransomware activities. It has the ability to launch user’s browser with URL received from the C&C server. It repeatedly opens the accessibility setting page until the user switches ON the ‘AccessibilityService’. The…

Read more

Again! A New .NET Ransomware Shrug2

Credit to Author: Ghanshyam More| Date: Fri, 10 Aug 2018 09:35:21 +0000

For several months, Quick Heal Security Labs has been observing an increase in ransomware which are built in  .NET framework. Ransomware like SamSam, Lime and now Shrug was found to be built in .NET framework. Malware authors are finding it very easy to build and obfuscate malware in .NET framework rather than making them in…

Read more

Cryptocurrency miner hits IoT devices, mostly affects Brazil and Russia!

Credit to Author: Pradeep Kulkarni| Date: Thu, 09 Aug 2018 08:46:11 +0000

According to a blogpost published on Aug 1, 2018, 200,000 routers in Brazil were compromised to deliver Cryptocurrency mining scripts to mine Monero (XMR) cryptocurrency. Hackers compromised the vulnerable MikroTik routers by injecting CoinHive scripts into the routers web pages in order to carry out the mass Cryptocurrency miner attack….

Read more

Beware of the Armage Ransomware – the File Destroyer!

Credit to Author: Shriram Munde| Date: Wed, 08 Aug 2018 12:25:38 +0000

In July last week, Quick Heal Security Labs detected a new ransomware called Armage. It appends ‘.Armage’ extension to files it encrypts. Armage ransomware uses the AES-256 encryption algorithm to encode files making them inoperable. It spreads via spam emails and corrupted text files. Technical analysis Once executed on the…

Read more

Threats to your digital life are increasing. Are you doing anything about it?

Credit to Author: Rajiv Singha| Date: Wed, 08 Aug 2018 05:48:41 +0000

It’s an exciting age to be alive! We are rapidly advancing towards greater heights of technology paying witness to inventions like the Internet of Things (IoT), Artificial Intelligence, Flying Cars, and the prospect of traveling to space as an excursion! The word ‘exciting’ fails to define these milestones mankind is…

Read more

Beware of the ‘Free Cycle Distribution Yojana’ WhatsApp message. It’s fake!

Credit to Author: Ganesh Lakariya| Date: Mon, 30 Jul 2018 09:24:29 +0000

As India’s Independence Day (15th of August) approaches, messages about free distribution schemes are doing the rounds on WhatsApp. Just recently, Quick Heal Security Labs detected a widespread circulation of one such message claiming that the Indian government will distribute free cycles to students on Independence Day, under the Free…

Read more

The evolution of a 4-year-old-threat Emotet: From an infamous Trojan to a complex threat distributer

Credit to Author: Aniruddha Dolas| Date: Wed, 25 Jul 2018 13:40:33 +0000

Emotet malware campaign has been existing for a long time. It comes frequently in intervals with different techniques and variants to deliver malware on a victim. Attackers are smart and they use complex techniques to avoid detection. At the start of 2017, we had seen the emotet campaign spreading through…

Read more

Quick Heal Total Security (Windows) achieves a 99.5% protection rate in AV-Comparatives’ test

Credit to Author: Rajiv Singha| Date: Mon, 23 Jul 2018 14:13:28 +0000

Quick Heal Total Security (Windows) has achieved a 99.5% protection rate in the Real-World Protection Test conducted by world’s leading security software testers AV-Comparatives. Real-World Protection Test February-June 2018 Experts at AV-Comparatives create a real-world environment to test security software. In this environment, malware (malicious software) behave in the same…

Read more

Your copy-paste habit can cost you your money

Credit to Author: Anant Pulgam| Date: Thu, 19 Jul 2018 07:40:40 +0000

How often do you store your important data in files? It’s very common, right? This data may be URLs, topics, personal data like contacts, email-ids, usernames of different portals and sometimes passwords too (though always recommended to not to do so). We very casually copy this data and paste it…

Read more

Quick Heal detects malware misusing the fame of Patanjali’s Kimbho app

Credit to Author: Rupali Parate| Date: Fri, 13 Jul 2018 10:14:16 +0000

When Patanjali’s Kimbho app came to Google Play Store, it made some headlines on the Internet, newspapers, TVs, etc. It had 1.5 lakh downloads in just 3 hours. Kimbho app was designed for socializing, messaging and sharing videos, images, etc., same as what the WhatsApp and Facebook app do. However,…

Read more