• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Malware Archive

Beware! Your website might be delivering Emotet malware

Beware! Your website might be delivering Emotet malware

Estimated reading time: 10 minutes

In 2018, we saw a surge in Emotet activity. Emotet started as a banking trojan but this blog will shed light on how it has also become a “threat distributor”. We will also discuss server-side and client-side activity and...
Read Blog
December 29, 2018
15
Shares

GandCrab says, “We will become back very soon! ;)”

GandCrab says, “We will become back very soon! ;)”

Estimated reading time: 5 minutes

GandCrab has been in the wild since last week of January 2018. Over the period it kept learning from its mistakes and GandCrab’s agile development grabbed the attention of many security researchers. From moving its servers to Namecoin powered Top Level...
Read Blog
December 18, 2018
19
Shares

Ghost Has Arrived

Ghost Has Arrived

Estimated reading time: 5 minutes

On the back of an upswing in Ransomware activity, we decided to carry out an in-depth analysis of Ghost Ransomware. Interesting fact about this malware is that it uses multiple components to encrypt user files. Technical Analysis : Main...
Read Blog
December 14, 2018
26
Shares

Sophisticated Ransomware : “Katyusha”

Sophisticated Ransomware : “Katyusha”

Estimated reading time: 6 minutes

For several months, Quick Heal Security Labs has been observing an increase in ransomware, we have found one more interesting ransomware which encrypts files and adds extension “.katyusha” and demands for an amount of 0.5 btc within three days and threatens to...
Read Blog
December 14, 2018
17
Shares

Obfuscated Equation Editor Exploit (CVE-2017-11882) spreading Hawkeye Keylogger

Obfuscated Equation Editor Exploit (CVE-2017-11882) spreading Hawkeye Keylogger

Estimated reading time: 6 minutes

Cyber-attacks through phishing emails are increasing and generally, attackers use DOC embedded macros to infiltrate victim’s machine. Recently Quick Heal Security Labs came across a Phishing e-mail sample which uses Microsoft’s equation editor exploit to spread Hawkeye keylogger. Cybercriminals...
Read Blog
November 1, 2018
5
Shares

Deep analysis of AZORult – The information exfiltrator

Deep analysis of AZORult – The information exfiltrator

Estimated reading time: 5 minutes

While the current focus in the cyberspace is on Ransomware and Cryptominers there are other prevalent threat actors silently making their way into victim’s machine in order to comprise it for malicious purpose. During the daily threat hunting task,Quick...
Read Blog
October 16, 2018

Emerging trend of spreading malware through IQY files

Emerging trend of spreading malware through IQY files

Estimated reading time: 4 minutes

Nowadays attackers are searching for new techniques to spread malware, recently we came across a new emerging way to deliver malware through IQY file. Till now we had seen spread of malware through various file types and chains such as...
Read Blog
October 3, 2018
13
Shares

CVE-2018-8440 – Task Scheduler ALPC Zero-Day Exploit in the Wild

CVE-2018-8440 – Task Scheduler ALPC Zero-Day Exploit in the Wild

Estimated reading time: < 1 minute

The recent zero-day vulnerability CVE-2018-8440 in Windows Task Scheduler enables attackers to perform a privilege elevation on targeted machines. Microsoft has released a security advisory CVE-2018-8440 on September 11, 2018 to address this issue. According to Microsoft, successful exploitation...
Read Blog
September 12, 2018

I am invisible – Monero (XMR) Miner

I am invisible – Monero (XMR) Miner

Estimated reading time: 4 minutes

From the last one year, Quick Heal Security Labs has been observing a boost in the number of mining malware. Nowadays malware authors are using mining as a replacement for Ransomware to make money. Recently Quick Heal Security Labs...
Read Blog
September 3, 2018

What are exploits? Everything you need to know

What are exploits? Everything you need to know

Estimated reading time: 3 minutes

Cybersecurity experts are always cautious when they hear the word “exploits”, and for good reason. Exploits are often a preferred channel through which cybercriminals like to hit their targets. What makes it easier for these criminals is that exploits...
Read Blog
August 25, 2018
16
Shares
← Previous 1 … 4 5 6 … 9 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (323) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies