Analysis of recent Locky ransomware outbreak

Quick Heal Security Labs is observing the infamous Locky ransomware outbreak which kicked off recently in the last week of September. The outbreak started with spam email with various subjects and different attachment names. On 26th September, spam campaign delivering a new variant of Locky ransomware started. The observed commonality in this campaign was the attachments ended with ‘.7z’ […]

You won’t believe what this ransomware demands

When we talk about motives behind any cyberattack, it is mostly money; a case in point is the ransomware – it locks your PC or encrypts your data and demands a ransom (in Bitcoins) to let go off the computer or decrypt the data. So basically, money is the main motive behind all ransomware attacks […]

CVE-2017-8759 | .NET Framework Remote Code Execution Vulnerability – An analysis by Quick Heal Security Labs

The recent zero-day vulnerability in .NET Framework vulnerability CVE-2017-8759 enables attackers to perform a Remote Code Execution on the targeted machine. This vulnerability is found to be exploited in the wild through email spam messages loaded with malicious RTF files as an attachment. Microsoft has released a security update on September 12, 2017, to fix […]

CVE-2017-9805 | Apache Struts 2 Remote Code Execution Vulnerability – An analysis by Quick Heal Security Labs

A critical remote code execution vulnerability has been discovered in the popular web application framework Apache Struts, which allows attackers to execute an arbitrary code. To address this issue, Apache Struts has issued a security advisory and CVE-2017-9805 has been assigned to it. The attacker may use this vulnerability to target organizations across the globe. […]

Facebook messenger malware

Security alert! Beware of the Facebook Messenger malware

A new malware has come to notice and it uses Facebook Messenger to spread from one user to another. Known as the Facebook Messenger malware, this threat is said to be highly sophisticated and can act differently based on the web browser the victim is using – Firefox, Chrome or Mozilla. How the malware works […]