• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Malware Archive

SnakeKeylogger: A Multistage Info Stealer Malware Campaign

SnakeKeylogger: A Multistage Info Stealer Malware Campaign

Estimated reading time: 6 minutes

SnakeKeylogger – A Multistage Info Stealer Malware Campaign Info-stealer malware has become a growing threat, with attackers constantly refining their techniques to evade detection. Among these threats, SnakeKeylogger has emerged as one of the highly active credential-stealing malware, targeting...
Read Blog
March 25, 2025

SVC New Stealer on the Horizon

SVC New Stealer on the Horizon

Estimated reading time: 5 minutes

SvcStealer 2025 is a new strain of information stealers, which is delivered through spear phishing email attachments. We observed SvcStealer malware campaign activity at the end of January 2025. This malware author harvests sensitive data such as machine data,...
Read Blog
March 21, 2025

5th January and The Tale of Joshi Virus: India’s First Global Computer Virus

5th January and The Tale of Joshi Virus: India’s First Global Computer Virus

Estimated reading time: 3 minutes

In the cinematic tapestry of cybersecurity, where tales of intrigue and innovation collide, one story emerges from the shadows of the past. It’s a story that began in the early 1990s, during the DOS era, when computer viruses were...
Read Blog
December 26, 2024

XWorm: Analyzing New Infection Tactics With Old Payload

XWorm: Analyzing New Infection Tactics With Old Payload

Estimated reading time: 5 minutes

Introduction: Attackers are continuously developing different techniques to infect systems and steal sensitive information. A recent campaign a multi-stage infection chain that starts with a LNK file, which lures the victim into opening an invoice in a web browser....
Read Blog
December 4, 2024
1

Operation Oxidový: Sophisticated Malware Campaign Targets Czech Officials Using NATO-Themed Decoys

Operation Oxidový: Sophisticated Malware Campaign Targets Czech Officials Using NATO-Themed Decoys

Estimated reading time: 9 minutes

Seqrite Labs APT-Team has recently found a campaign targeting the Czech Republic. The campaign targets government and military officials with multiple lures aimed at the relationship between NATO and the Czech Republic. The entire malware ecosystem is involved in...
Read Blog
August 28, 2024

What Can Be The Estimate Losses Caused By The Recent IT Outage Caused By Faulty CrowdStrike Update?

What Can Be The Estimate Losses Caused By The Recent IT Outage Caused By Faulty CrowdStrike Update?

Estimated reading time: 3 minutes

Cyberattacks using computer viruses or malware have been costing billions of dollars each year in cleanup and repair costs. Having been in this industry for almost three decades, I still recall some of the most notable and devastating computer...
Read Blog
July 30, 2024

Umbrella of Pakistani Threats: Converging Tactics of Cyber-operations Targeting India

Umbrella of Pakistani Threats: Converging Tactics of Cyber-operations Targeting India

Estimated reading time: 16 minutes

An open directory hosting malware linked to Transparent Tribe (APT36) has been found by SEQRITE Labs APT team. Further analysis revealed hidden URLs on the same domain containing payloads used by its sub-division APT group SideCopy. Targeting of Indian...
Read Blog
July 25, 2024

Unmasking AsukaStealer: The $80 Malware Threatening Your Digital Security

Unmasking AsukaStealer: The $80 Malware Threatening Your Digital Security

Estimated reading time: 4 minutes

AsukaStealer, marketed on a Russian-language cybercrime forum by the alias ‘breakcore,’ has been exposed. The perpetrator offers its services for a monthly fee of $80, targeting individuals and organizations seeking to exploit its capabilities for malicious purposes. Written in...
Read Blog
May 30, 2024

Exposing Coyote: The Next-Gen Banking Trojan Revolutionizing Cyber Threats in Brazil

Exposing Coyote: The Next-Gen Banking Trojan Revolutionizing Cyber Threats in Brazil

Estimated reading time: 4 minutes

Recently, we came across a new banking trojan called Coyote, which utilizes a tool/library called Squirrel Installer, developed to install and manage updates of windows applications. The malware looks more evolved than our normal banking trojans and can potentially...
Read Blog
April 11, 2024

Decoding BATLOADER 2.X: Unmasking the Threat of Stealthy Malware Tactics

Decoding BATLOADER 2.X: Unmasking the Threat of Stealthy Malware Tactics

Estimated reading time: 5 minutes

Overview: Batloader is not a new malware in the series – it is an emerging one. In our previous blogs, we discussed how Batloader can deploy different types of malware, including stealers and ransomware. We also delved into its...
Read Blog
December 18, 2023
1 2 … 9 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (20) Cyber-attack (36) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (324) cyber security (32) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (12) data protection (25) data security (15) DLP (49) Encryption (16) endpoint security (108) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (14) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies