• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Author
Sathwik Ram Prakki

About Sathwik Ram Prakki

Sathwik Ram Prakki is working as a Security Researcher in Security Labs at Quick Heal. His focus areas are Threat Intelligence, Threat Hunting, and writing about detection. He has a background in Offensive Security & Windows Internals and is keen on exploring new detection techniques through Reverse Engineering and Malware Research.

SideCopy’s Multi-platform Onslaught: Leveraging WinRAR Zero-Day and Linux Variant of Ares RAT

SideCopy’s Multi-platform Onslaught: Leveraging WinRAR Zero-Day and Linux Variant of Ares RAT

Estimated reading time: 13 minutes

SEQRITE Labs APT-Team has discovered multiple campaigns of APT SideCopy, targeting Indian government and defense entities in the past few months. The threat group is now exploiting the recent WinRAR vulnerability CVE-2023-38831 (See our advisory for more details) to...
Read More
November 6, 2023

Double Action, Triple Infection, and a New RAT: SideCopy’s Persistent Targeting of Indian Defence

Double Action, Triple Infection, and a New RAT: SideCopy’s Persistent Targeting of Indian Defence

Estimated reading time: 4 minutes

Overview A new attack campaign of SideCopy APT has been discovered targeting the Indian Defence sector. The group utilizes phishing email attachments & URLs as the infection vector to download malicious archive files leading to the deployment of two...
Read More
June 15, 2023

Transparent Tribe APT actively lures Indian Army amidst increased targeting of Educational Institutions

Transparent Tribe APT actively lures Indian Army amidst increased targeting of Educational Institutions

Estimated reading time: 2 minutes

Overview APT Transparent Tribe (APT36) is luring the Indian Army into opening the malicious file themed ‘Revision of Officers posting policy.’ Quick Heal’s APT Team has been constantly tracking this persistent threat group and has encountered a new attack...
Read More
May 2, 2023

Uncovering LockBit Black’s Attack Chain and Anti-forensic activity

Uncovering LockBit Black’s Attack Chain and Anti-forensic activity

Estimated reading time: 6 minutes

Since the infamous Conti ransomware group disbanded due to source code leaks during the Russia-Ukraine war, the LockBit group has claimed dominance. The group has adopted new extortion techniques and added a first-of-its-kind bug-bounty program, along with many features,...
Read More
February 1, 2023

Calling from the Underground: An alternative way to penetrate corporate networks

Calling from the Underground: An alternative way to penetrate corporate networks

Estimated reading time: 5 minutes

Threat actors use multiple methods to distribute malware to infect specific targets. Even though various phishing methods are actively used and evolving, an alternative approach to increase their success rate is to call the target corporate companies. Techniques like...
Read More
January 11, 2023
Popular Posts
  • SideCopy’s Multi-platform Onslaught: Leveraging WinRAR Zero-Day and Linux Variant of Ares RAT SideCopy’s Multi-platform Onslaught: Leveraging WinRAR Zero-Day and Linux Variant of Ares RAT November 6, 2023
  • Casting Light on BATLOADER: An Insight into its Role in Malware Delivery Casting Light on BATLOADER: An Insight into its Role in Malware Delivery November 8, 2023
  • MedusaLocker Ransomware: An In-Depth Technical Analysis and Prevention Strategies MedusaLocker Ransomware: An In-Depth Technical Analysis and Prevention Strategies October 16, 2023
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Jayesh Kulkarni
    Jayesh Kulkarni

    Jayesh is working as a Security Researcher for a couple of years. He likes to...

    Read more..
Stay Updated!
Topics
apt (13) Cyber-attack (32) cyber-attacks (56) cyberattack (13) cyberattacks (12) cyber security (26) Cybersecurity (305) Cyber threat (29) cyber threats (44) Data (11) data breach (50) data breaches (27) data loss (28) data loss prevention (33) data protection (21) data security (13) DLP (49) Encryption (16) endpoint security (103) Enterprise security (16) Exploit (12) firewall (11) GDPR (11) hackers (11) IoT (10) malware (66) malware attack (23) malware attacks (12) MDM (25) Microsoft (14) Network security (18) Patch Management (12) phishing (19) Ransomware (62) ransomware attack (29) ransomware attacks (30) ransomware protection (12) security (10) Seqrite (27) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Products
  • HawkkWatch MDR
  • Seqrite MSSP Portal
  • HawkkScan
  • HawkkProtect
  • HawkkHunt XDR
  • HawkkEye
  • HawkkEye Endpoint Security Cloud
  • HawkkEye mSuite
  • HawkkEye Workspace
  • Endpoint Security (EPS)
  • Unified Threat Management
  • Antivirus for Linux
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • Company Overview
  • Leadership
  • Why choose SEQRITE?
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category

© 2022 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website.
By browsing this website, you agree to our cookie policy.