Proactive Measures to Safeguard against the Ransomware Menace

Credit to Author: Quick Heal Security Labs| Date: Fri, 09 Dec 2022 08:18:20 +0000

  Ransomware is a sophisticated malware that infects computing devices and holds the data hostage intending to extort…

The post Proactive Measures to Safeguard against the Ransomware Menace appeared first on Quick Heal Blog | Latest computer security news, tips, and advice.

Read more

Are Malware operators using NSIS Installers to bombard Stealers and avoid detection?

Credit to Author: Tejaswini Sandapolla| Date: Fri, 21 Oct 2022 08:01:28 +0000

  Threat actors have been using new techniques to hide their codes and avoid detection in every manner….

The post Are Malware operators using NSIS Installers to bombard Stealers and avoid detection? appeared first on Quick Heal Blog | Latest computer security news, tips, and advice.

Read more

PowerShell: An Attacker’s Paradise

Credit to Author: Mrigank Tyagi| Date: Fri, 29 Jul 2022 12:13:02 +0000

  PowerShell was originally intended as a task automation and configuration management program for system administrators. However, it…

The post PowerShell: An Attacker’s Paradise appeared first on Quick Heal Blog | Latest computer security news, tips, and advice.

Read more

Attacker uses tricky technique of Excel 4.0 in Malspam campaign

Credit to Author: Anjali Raut| Date: Sat, 02 Nov 2019 12:56:15 +0000

Use of Phishing emails is not new for cyber-attack and is still one of the classic strategies to compromise a victim’s machine. Cyber criminals lure victims to open email attachments (mostly Doc and XLS files) by faking them to look like important one using keywords like invoice, payment, finance, order…

Read more

Ransomware As A Tool – LockerGoga

Credit to Author: Ghanshyam More| Date: Wed, 03 Jul 2019 07:18:00 +0000

Ransomware authors keep experimenting with the development of payload in various dimensions. In the timeline of ransomware implementations, we have seen its evolution from a simple screen locker to multi-component model for file encryption, from novice approach to a sophisticated one. The Ransomware as a Tool has evolved in wild…

Read more

Anatova, A modular ransomware

Credit to Author: Shriram Munde| Date: Tue, 29 Jan 2019 06:09:49 +0000

While everyone was engaged in new year celebrations, malware authors were busy creating new ransomware for 2019. Quick Heal Security Labs has discovered the first ransomware of 2019 — Anatova ransomware. During our analysis, we found that Anatova is not just ransomware but a modular one. By modular ransomware we…

Read more

Mongolock Ransomware deletes files and targets databases

Credit to Author: Shriram Munde| Date: Tue, 29 Jan 2019 05:30:20 +0000

Ransomware has become one of the most dangerous cyber-attack methods because of the different techniques it uses to encrypt the files and evade the detection of security software to earn money. Also, at a time, it’s not limited to encrypting user’s files but also deletes the files and formats the…

Read more

Malspam email – Jack of all malware, master of none.

Credit to Author: Shriram Munde| Date: Mon, 21 Jan 2019 07:37:49 +0000

Malspam email or malicious spam emails are considered to be one of the favorite malware delivery channels for the attackers to deliver the malware to targeted victims. Attackers also run spam email campaigns to distribute their malware to a large number of users. For attackers to succeed, two things are…

Read more