Log4Shell vulnerability

CVE-2021-44228: New Apache Log4j ‘Log4Shell’ Zero-Day Being Exploited in the Wild

A critical zero-day vulnerability (CVE-2021-44228) recently discovered Apache Log4J, the popular java open source logging library used in countless worldwide applications. The maximum severity vulnerability has been identified as ‘Log4Shell‘, which, if exploited, could permit a remote attacker to take control of vulnerable systems and execute arbitrary code remotely. According to some security researchers, the […]

Babuk Ransomware

Anydesk Software Exploited to Spread Babuk Ransomware

We generally see that ransomware attacks are deployed through exploits, unsolicited malicious emails (malspam), or malicious Microsoft Office documents. Attackers trick the unsuspecting users into enabling macros, etc. Apart from these usual attack techniques, we came across a new way of using Anydesk software fake websites to spread Babuk ransomware. Anydesk is a remote-control tool […]

WSL (Windows Subsystem for Linux)

Stay Alert – Malware Authors Deploy ELF as Windows Loaders to Exploit WSL feature

What is WSL? The Windows Subsystem for Linux (WSL) is a resource inside the Windows operating system that allows users to execute Linux command lines on a machine running Windows operating system. The Windows Subsystem for Linux uses an application known as Bash.exe, which launches a Linux dialogue box within the Windows operating system interface. […]

Multi-Staged JSOutProx RAT Targets Indian Co-operative Banks and Finance Companies

  Quick Heal Security Labs has been monitoring various attack campaigns using JSOutProx RAT against different SMBs in the BFSI sector since January 2021. We have found multiple payloads being dropped at different stages of its operations. Although the RAT campaigns have also been previously reported on other countries, those targeting Indian companies are operated […]

Phishing attack

What is Phishing? A Deep Dive into the Phishing Attack Mechanisms with Tips

Phishing is a technique used to steal credentials, personal information & financial details of a user. The attacker sends email or text to spoof the target, luring them to open malicious links or attachments. The most prevalent ways attackers attempt phishing attack are through social networking sites, SMS, and email notifications. We see a sudden […]

cryptocurrency

Blockchain & Fraud Prevention: Strategies to overcome the cryptocurrency scam

What is Cryptocurrency?  Cryptocurrency is a type of digital currency that generally only exists electronically. There is no physical coin or bill unless you use a service to cash in cryptocurrency for a physical token. You usually exchange cryptocurrency with someone online, with your phone or computer, without using an intermediary like a bank. Bitcoin […]