Estimated reading time: 11 minutes
Contents Introduction Key Targets Industries Affected Geographical focus Geopolitical Context Infection Chain Timeline of Activity Initial Findings Looking into the Decoy Documents Technical Analysis Stage 1 – Malicious Archive Delivery Stage 2 – Malicious Shortcut Execution Stage 3 –...Information Technology, Network Security & Cybersecurity Updates
Estimated reading time: 3 minutes
From Encryption to Real-World Attack Prevention In today’s hyper-connected digital environment, secure communication is not just about encrypting data—it is about preventing attackers from abusing exposed services. Secure communication protocols protect data in transit, but misconfigurations and weak access...
Estimated reading time: 3 minutes
Artificial Intelligence (AI) has moved from being a futuristic buzzword to a boardroom priority. In cybersecurity, especially, AI is often positioned as the silver bullet, capable of detecting threats in milliseconds, predicting attacks before they happen, and automating complex...
Estimated reading time: 7 minutes
In recent years, Android malware campaigns in India have increasingly abused the trust associated with government services and official digital platforms. By imitating well-known portals and leveraging social engineering through messaging applications, threat actors exploit user urgency and lack...
Estimated reading time: 4 minutes
India’s Digital Personal Data Protection (DPDP) Act fundamentally changes how organizations collect, use, store, and protect personal data. It applies to any organization handling digital personal data of individuals in India, regardless of where the organization is located. For...
Estimated reading time: 11 minutes
Contents Introduction Key Targets. Industries Affected. Geographical Focus. Infection Chain. Initial Findings. Looking into the decoy-document Technical Analysis Stage 1 – Malicious LNK Script Stage 2 – DUPERUNNER Implant Stage 3 – AdaptixC2 Beacon. Infrastructural Artefacts. Conclusion SEQRITE Protection....Estimated reading time: 11 minutes
Table of Contents: Introduction: Infection Chain: Targeted sectors: Initial Findings about Campaign: Analysis of Decoy: Technical Analysis: Stage-1: Analysis of Windows Shortcut file (.LNK). Stage-2: Analysis of Batch file. Stage-3: Details analysis of Covert RAT. Conclusion: Seqrite Coverage: IOCs...