• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Technical Archive

Android Cryptojacker Disguised as Banking App Exploits Device Lock State

Android Cryptojacker Disguised as Banking App Exploits Device Lock State

Estimated reading time: 8 minutes

The global craze around cryptocurrency has fueled both innovation and exploitation. While many legally chase digital gold, cybercriminals hijack devices to mine it covertly. Recently, we encountered a phishing website impersonating a well-known bank, hosting a fake Android app....
Read Blog
July 18, 2025

UNG0002: Regional Threat Operations Tracked Across Multiple Asian Jurisdictions

UNG0002: Regional Threat Operations Tracked Across Multiple Asian Jurisdictions

Estimated reading time: 5 minutes

Overview Seqrite Labs APT-Team has identified and tracked UNG0002 also known as Unknown Group 0002, a bunch of espionage-oriented operations which has been grouped under the same cluster conducting campaigns across multiple Asian jurisdictions including China, Hong Kong, and...
Read Blog
July 16, 2025

Masslogger Fileless Variant – Spreads via .VBE, Hides in Registry

Masslogger Fileless Variant – Spreads via .VBE, Hides in Registry

Estimated reading time: 9 minutes

During our recent investigation at Seqrite Labs, we identified a sophisticated variant of Masslogger credential stealer malware spreading through .VBE (VBScript Encoded) files. Initially, the variant appeared to be a typical script-based threat, but upon deeper analysis it turned...
Read Blog
June 18, 2025

Security Flaws in eMagicOne Store Manager for WooCommerce in WordPress (CVE-2025-5058 and CVE-2025-4603)

Security Flaws in eMagicOne Store Manager for WooCommerce in WordPress (CVE-2025-5058 and CVE-2025-4603)

Estimated reading time: 3 minutes

The eMagicOne Store Manager for WooCommerce plugin is in WordPress used to simplify and improve store management by providing functionality not found in the normal WooCommerce admin interface. Two serious flaws, CVE-2025-5058 and CVE-2025-4603, were found in the eMagicOne...
Read Blog
June 10, 2025

Operation DRAGONCLONE: Chinese Telecommunication industry targeted via VELETRIX & VShell malware

Operation DRAGONCLONE: Chinese Telecommunication industry targeted via VELETRIX & VShell malware

Estimated reading time: 10 minutes

Contents Introduction Initial Findings Infection Chain. Technical Analysis Stage 0 – Malicious ZIP File. Stage 1 – Malicious VELETRIX implant. Stage 2 – Malicious V-Shell implant. Hunting and Infrastructure. Attribution Conclusion Seqrite Protection. IOCs MITRE ATT&CK. Authors: Subhajeet Singha...
Read Blog
June 6, 2025

Unveiling Swan Vector APT Targeting Taiwan and Japan with varied DLL Implants

Unveiling Swan Vector APT Targeting Taiwan and Japan with varied DLL Implants

Estimated reading time: 14 minutes

Content Introduction Initial Findings. Looking into the decoy. Infection Chain. Technical Analysis. Stage 1 – Malicious LNK Script. Stage 2 – Malicious Pterois Implant. Stage 3 – Malicious Isurus Implant. Stage 4 – Malicious Cobalt Strike Shellcode. Infrastructure and...
Read Blog
May 12, 2025

Security Flaw in Yelp Help Viewer (CVE-2025-3155)

Security Flaw in Yelp Help Viewer (CVE-2025-3155)

Estimated reading time: 4 minutes

Yelp is the default help browser in GNOME-based Linux distributions, including widely used systems such as Ubuntu, Fedora and Debian etc. It is responsible for rendering help documentation written in the Mallard XML format and integrates tightly with the...
Read Blog
May 12, 2025

Beware! Fake ‘NextGen mParivahan’ Malware Returns with Enhanced Stealth and Data Theft

Beware! Fake ‘NextGen mParivahan’ Malware Returns with Enhanced Stealth and Data Theft

Estimated reading time: 8 minutes

Cybercriminals continually refine their tactics, making Android malware more insidious and challenging to detect. A new variant of the fake NextGen mParivahan malware has emerged, following its predecessor’s deceptive strategies but introducing significant enhancements. Previously, attackers exploited the government’s...
Read Blog
April 9, 2025

Kimsuky: A Continuous Threat to South Korea with Deceptive Tactics

Kimsuky: A Continuous Threat to South Korea with Deceptive Tactics

Estimated reading time: 8 minutes

Kimsuky: A Continuous Threat to South Korea with Deceptive Tactics Contents Introduction Infection Chain Initial Findings Campaign 1 Looking into PDF document. Campaign 2 Looking into PDF document. Technical Analysis Campaign 1 & 2 Conclusion Seqrite Protection MITRE ATT&CK...
Read Blog
April 4, 2025

Operation HollowQuill: Malware delivered into Russian R&D Networks via Research Decoy PDFs

Estimated reading time: 10 minutes

Contents Introduction Key Targets Industries Affected Geographical Focus Infection Chain Initial Findings Looking into the decoy-document Technical Analysis Stage 1 – Malicious RAR File Stage 2 – Malicious .NET malware-dropper Stage 3 – Malicious Golang Shellcode loader Stage 4...
Read Blog
March 31, 2025
1 2 … 4 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (22) BYOD (11) Cyber-attack (36) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (327) cyber security (34) Cyber threat (33) cyber threats (48) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (13) data protection (28) data security (15) DLP (49) Encryption (16) endpoint security (109) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (26) Microsoft (15) Network security (23) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (14) security (12) Seqrite (35) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (17) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies