• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Author
Prashil Moon

About Prashil Moon

Prashil is a Senior Security Researcher at Quick Heal Security Labs. He enthusiastically keeps hunting for ongoing malware trends, runs analysis on malware families, and has a keen interest in blogging about trends observed during his research.

Indian Income Tax-Themed Phishing Campaign Targets Local Businesses

Indian Income Tax-Themed Phishing Campaign Targets Local Businesses

Estimated reading time: 9 minutes

Introduction Over the past few months, tax-themed phishing and malware campaigns have surged, particularly during and after the Income Tax Return (ITR) filing season. With ongoing public discussions around refund timelines, these scams appear more credible, giving attackers the...
Read Blog
December 22, 2025

Deceptive Layoff-Themed HR Email Distributes Remcos RAT Malware

Deceptive Layoff-Themed HR Email Distributes Remcos RAT Malware

Estimated reading time: 4 minutes

Over the past few months, job economy has been marked by uncertainty, with constant news about layoffs, restructuring, hiring freezes, and aggressive cost-cutting measures. This atmosphere has created widespread anxiety among both employees and organizations, and cybercriminals have quickly...
Read Blog
December 9, 2025

Judicial Notification Phish Targets Colombian Users – .SVG Attachment Deploys Info-stealer Malware

Estimated reading time: 9 minutes

Content Overview Introduction Initial Vector Infection Chain Analysis of .SVG Attachment Analysis of .HTA file Analysis of .VBS file Analysis of .ps1 file Analysis of Downloader/Loader Anti-VM Technique Persistence Technique Download and Loader Function AsyncRAT Payload File MD5’s Quick...
Read Blog
October 13, 2025

Masslogger Fileless Variant – Spreads via .VBE, Hides in Registry

Masslogger Fileless Variant – Spreads via .VBE, Hides in Registry

Estimated reading time: 9 minutes

During our recent investigation at Seqrite Labs, we identified a sophisticated variant of Masslogger credential stealer malware spreading through .VBE (VBScript Encoded) files. Initially, the variant appeared to be a typical script-based threat, but upon deeper analysis it turned...
Read Blog
June 18, 2025

SnakeKeylogger: A Multistage Info Stealer Malware Campaign

SnakeKeylogger: A Multistage Info Stealer Malware Campaign

Estimated reading time: 6 minutes

Info-stealer malware has become a growing threat, with attackers constantly refining their techniques to evade detection. Among these threats, SnakeKeylogger has emerged as one of the highly active credential-stealing malware, targeting individuals and businesses. Known for its multi-stage infection...
Read Blog
March 25, 2025

Email campaign using .url extensions to abuse Internet Explorer vulnerabilities (CVE-2016-3353)

Email campaign using .url extensions to abuse Internet Explorer vulnerabilities (CVE-2016-3353)

Estimated reading time: 4 minutes

In the wild, malspam campaigns are a major medium to spread malware. Previously, we have written about such campaigns using MS Office files with malicious macro and using vulnerabilities. Recently, we observed a spam campaign that uses .url files...
Read Blog
March 14, 2018
5
Shares

New fake resume email campaign infecting users with the SmokeLoader malware

New fake resume email campaign infecting users with the SmokeLoader malware

Estimated reading time: 4 minutes

Email attachments are a favorite medium for attackers to deliver malware. They can be used to target a specific user or multiple users at the same time by launching spam email campaigns. To succeed in carrying out an intended...
Read Blog
January 29, 2018
8
Shares

Chrome extensions exploited in a massive PUA campaign

Chrome extensions exploited in a massive PUA campaign

Estimated reading time: 4 minutes

Browser extensions also known as add-ons or plug-ins are programs that extend the functionality of a web browser making it more convenient to use and giving a better browsing experience. Browser extensions are commonly used to Enhance the appearance...
Read Blog
January 11, 2018
3
Shares
1
Featured Authors
  • Seqrite
    Seqrite

    Seqrite is a leading enterprise cybersecurity solutions provider. With a focus...

    Read more..
  • Jyoti Karlekar
    Jyoti Karlekar

    I'm an avid writer who enjoys crafting content about emerging technologies and...

    Read more..
  • Bineesh P
    Bineesh P

    I am a passionate cybersecurity enthusiast and a dedicated writer. With a knack...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
Topics
apt (25) Cyber-attack (36) cyber-attacks (58) cyberattack (16) cyberattacks (15) Cybersecurity (334) cyber security (34) Cyber threat (33) cyber threats (50) data breach (56) data breaches (29) data loss (28) data loss prevention (33) data privacy (14) data protection (30) data security (15) DLP (49) DPDP (13) DPDPA (14) Encryption (16) endpoint security (110) Enterprise security (18) Exploit (13) GDPR (13) malware (76) malware analysis (13) malware attack (23) malware attacks (12) MDM (27) Microsoft (15) Network security (24) Patch Management (12) phishing (29) Ransomware (69) ransomware attack (30) ransomware attacks (30) ransomware protection (14) Seqrite (40) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) Threat Intelligence (13) UTM (34) Vulnerability (16) zero trust (13)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2026 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies