An in-depth analysis of a new, emerging “.url” malware campaign – by Quick Heal Security Labs

Credit to Author: Pradeep Kulkarni| Date: Mon, 19 Mar 2018 14:19:13 +0000

Last week, we had blogged about the emergence of a new attack vector ‘.url’ which is used to spread malware. In this blog post, we will deep-dive into the attack chain of this ‘.url’ vector and elaborate on the Quant Loader malware which is actively making use of it. Let’s…

Read more

An in-depth analysis of a new, emerging “.url” malware campaign – An analysis by Quick Heal Security Labs

Credit to Author: Pradeep Kulkarni| Date: Mon, 19 Mar 2018 14:19:13 +0000

Last week, we had blogged about the emergence of a new attack vector ‘.url’ which is used to spread malware. In this blog post, we will deep-dive into the attack chain of this ‘.url’ vector and elaborate on the Quant Loader malware which is actively making use of it. Let’s…

Read more

An analysis of the Zenis ransomware by Quick Heal Security Labs

Credit to Author: Shriram Munde| Date: Mon, 19 Mar 2018 12:56:40 +0000

Quick Heal Security Labs has come across a new ransomware that goes by the name ‘Zenis’. The ransomware not only encrypts files but also intentionally deletes the infected system’s backup.   The behavior of Zenis ransomware Upon inside a computer, the ransomware performs the following checks before it starts encrypting…

Read more

The A-Z dictionary of cybersecurity terms

Credit to Author: Rajib Singha| Date: Thu, 15 Mar 2018 11:30:50 +0000

Whether you are a normal user or a tech-guru, being aware of the computer security threats will help fortify your defense against them. So, here’s a handy A-Z dictionary of cybersecurity terms. Index A | B | C | D | E | F | I | K | L…

Read more

Email campaign using .url extensions to abuse Internet Explorer vulnerabilities (CVE-2016-3353)

Credit to Author: Prashil Moon| Date: Wed, 14 Mar 2018 08:58:25 +0000

In the wild, malspam campaigns are a major medium to spread malware. Previously, we have written about such campaigns using MS Office files with malicious macro and using vulnerabilities. Recently, we observed a spam campaign that uses .url files as a first-stage downloader to spread malware and bypass security features….

Read more

A free guide to 7 computer viruses you should know about

Credit to Author: Rajib Singha| Date: Tue, 13 Mar 2018 08:23:09 +0000

Computer viruses are nasty little programs that are designed to lay waste to your computer. Some destroy files stored on your PC, while some trigger different software to malfunction. More nefarious viruses steal your confidential information and some even go to an extent to rig a system’s power load and…

Read more

Do not fall for the WhatsApp message about Jio Prime Offer. It’s a hoax!

Credit to Author: Rajib Singha| Date: Thu, 08 Mar 2018 10:49:02 +0000

A message about a Jio Prime offer is circulating among WhatsApp users. Do not fall for it because it’s a hoax. Last evening, I received this message from one of my contacts. Looks like a genuine message, doesn’t it? But, it is nothing but a hoax. How do we know?…

Read more