QuickHeal

QuickHealSecurity

Android ransomware demands iTunes gift cards as a ransom – an analysis by Quick Heal Security Labs

Credit to Author: Bajrang Mane| Date: Tue, 12 Dec 2017 15:12:04 +0000

Typically, a ransomware will demand money or cryptocurrency after it has locked down your computer or phone or encrypted its data. But, Quick Heal Security Labs has spotted an Android ransomware that demands iTunes gift cards after it locks down the infected device. These gift cards can be sold on…

Read More
QuickHealSecurity

Android ransomware demands iTunes gift card as a ransom – an analysis by Quick Heal Security Labs

Credit to Author: Bajrang Mane| Date: Tue, 12 Dec 2017 15:12:04 +0000

Typically, a ransomware will demand money or cryptocurrency after it has locked down your computer or phone or encrypted its data. But, Quick Heal Security Labs has spotted an Android ransomware that demands iTunes gift cards after it locks down the infected device. These gift cards can be sold on…

Read More
QuickHealSecurity

Quick Heal Total Security receives BEST+++ certification from AVLab in Fileless Malware Protection Test

Credit to Author: Rajib Singha| Date: Thu, 07 Dec 2017 10:14:28 +0000

AVLab is an independent organization that conducts tests on security software for corporate networks and individual user devices. These tests are conducted by using malicious software, tools, and bypassing security techniques that are used in real cyberattacks. In October 2017, AVLab conducted a Fileless Malware Protection Test. In this test,…

Read More
QuickHealSecurity

An emerging trend of DDE based Office malware – an analysis by Quick Heal Security Labs

Credit to Author: Aniruddha Dolas| Date: Wed, 06 Dec 2017 09:27:30 +0000

For the past few years, we have been seeing macro-based attacks through Object Linking Embedding (OLE)/Microsoft Office files. But, presently, attackers are using a different technique to spread malware through Office files – using a new attack vector called ‘Dynamic Data Exchange (DDE)’. DDE is an authorized Microsoft Office feature that provides several methods for transferring data between applications. Once the communication protocol is established, it doesn’t require user interactions…

Read More
QuickHealSecurity

Beware of fake social media messages that talk about SMS-based Aadhaar-LIC linking

Credit to Author: Rajib Singha| Date: Mon, 04 Dec 2017 12:11:32 +0000

You might be aware that LIC policyholders must now link their Aadhaar and PAN to their policies according to a directive issued by the Government of India. The deadline for the Aadhaar-LIC linking is December 31, 2017. And unsurprisingly, fraudsters have started misusing news to their advantage. How? Read what…

Read More
QuickHealSecurity

IcedID – a new sophisticated banking Trojan: a technical analysis by Quick Heal Security Labs

Credit to Author: Bajrang Mane| Date: Wed, 29 Nov 2017 13:23:03 +0000

IcedID is a new player in the banking Trojan family. It has a modular architecture and capable of stealing banking credentials of the user by performing a man-in-the-middle attack (MITM). IcedID sets up a local proxy and redirects all Internet traffic through it. Additionally, it can download and execute components…

Read More
QuickHealSecurity

Technical Analysis of ‘IcedID’: a new sophisticated banking Trojan – an analysis by Quick Heal Security Labs

Credit to Author: Bajrang Mane| Date: Wed, 29 Nov 2017 13:23:03 +0000

IcedID is a new player in the banking Trojan family. It has a modular architecture and capable of stealing banking credentials of the user by performing a man-in-the-middle attack (MITM). IcedID sets up a local proxy and redirects all Internet traffic through it. Additionally, it can download and execute components…

Read More