• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Phishing Archive

Goodbye HTA, Hello MSI: New TTPs and Clusters of an APT driven by Multi-Platform Attacks

Goodbye HTA, Hello MSI: New TTPs and Clusters of an APT driven by Multi-Platform Attacks

Estimated reading time: 13 minutes

Seqrite Labs APT team has uncovered new tactics of Pakistan-linked SideCopy APT deployed since the last week of December 2024. The group has expanded its scope of targeting beyond Indian government, defence, maritime sectors, and university students to now...
Read Blog
April 8, 2025

SVC New Stealer on the Horizon

SVC New Stealer on the Horizon

Estimated reading time: 5 minutes

SvcStealer 2025 is a new strain of information stealers, which is delivered through spear phishing email attachments. We observed SvcStealer malware campaign activity at the end of January 2025. This malware author harvests sensitive data such as machine data,...
Read Blog
March 21, 2025

QR Code Phishing (Quishing) Attacks: How to Spot & Prevent Them

QR Code Phishing (Quishing) Attacks: How to Spot & Prevent Them

Estimated reading time: 6 minutes

The Rising Threat of QR Code-Driven Phishing Schemes A new kind of cyberattack has emerged in recent years as a result of QR codes’ popularity as a quick and easy way to share information. Businesses are increasingly at risk...
Read Blog
March 18, 2025

Unmasking GrassCall Campaign: The Hackers Behind Job Recruitment Cyber Scams

Unmasking GrassCall Campaign: The Hackers Behind Job Recruitment Cyber Scams

Estimated reading time: 5 minutes

Unmasking GrassCall Campaign: The Hackers Behind Job Recruitment Cyber Scams The “GrassCall” malware campaign represents an advanced social engineering attack carried out by a Russian-speaking cyber-criminal organization referred to as “Crazy Evil,” with its subgroup “kevland” leading the operation....
Read Blog
March 6, 2025

Phishing 2.0: New Techniques Cybercriminals Use to Trick Victims

Phishing 2.0: New Techniques Cybercriminals Use to Trick Victims

Estimated reading time: 3 minutes

Phishing has drastically transformed from its early days as a simple scam targeting unwary email users. Modern phishing techniques—dubbed “Phishing 2.0″—are more complex, highly tailored, and designed to bypass even the most robust security systems. In this blog, we’ll...
Read Blog
February 28, 2025

How To Protect Your Brand From Fake Websites and Online Impersonation

How To Protect Your Brand From Fake Websites and Online Impersonation

Estimated reading time: 3 minutes

We are observing a rise in fake websites offering investment-related services. Many of these impersonate well-known brands by creating replicas of their official websites. Unsuspecting visitors interact with these fake websites, fall victim to scams, and lose large sums...
Read Blog
December 13, 2024

How To Defend Against Advanced Persistent Threats (APTs): A Comprehensive Approach

How To Defend Against Advanced Persistent Threats (APTs): A Comprehensive Approach

Estimated reading time: 5 minutes

How To Defend Against Advanced Persistent Threats (APTs): A Comprehensive Approach In today’s time, one of the most formidable threats organizations face today is the Advanced Persistent Threat (APT). These sophisticated, targeted attacks are designed to infiltrate networks, steal...
Read Blog
September 27, 2024

Umbrella of Pakistani Threats: Converging Tactics of Cyber-operations Targeting India

Umbrella of Pakistani Threats: Converging Tactics of Cyber-operations Targeting India

Estimated reading time: 16 minutes

An open directory hosting malware linked to Transparent Tribe (APT36) has been found by SEQRITE Labs APT team. Further analysis revealed hidden URLs on the same domain containing payloads used by its sub-division APT group SideCopy. Targeting of Indian...
Read Blog
July 25, 2024

Operation RusticWeb targets Indian Govt: From Rust-based malware to Web-service exfiltration

Operation RusticWeb targets Indian Govt: From Rust-based malware to Web-service exfiltration

Estimated reading time: 11 minutes

SEQRITE Labs APT-Team has uncovered a phishing campaign targeting various Indian government personnel since October 2023. We have also identified targeting of both government and private entities in the defence sector over December. New Rust-based payloads and encrypted PowerShell commands have been utilized...
Read Blog
December 21, 2023

SideCopy’s Multi-platform Onslaught: Leveraging WinRAR Zero-Day and Linux Variant of Ares RAT

SideCopy’s Multi-platform Onslaught: Leveraging WinRAR Zero-Day and Linux Variant of Ares RAT

Estimated reading time: 11 minutes

SEQRITE Labs APT-Team has discovered multiple campaigns of APT SideCopy, targeting Indian government and defense entities in the past few months. The threat group is now exploiting the recent WinRAR vulnerability CVE-2023-38831 (See our advisory for more details) to...
Read Blog
November 6, 2023
1 2 3 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (20) Cyber-attack (36) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (324) cyber security (32) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (12) data protection (25) data security (15) DLP (49) Encryption (16) endpoint security (108) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (14) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies