Sextortion Scam

Sextortion Scam: Blackmail scam emails that demand Bitcoin

What is Sextortion?  Sextortion is a scam via email or any other medium to blackmail the victim and threaten to expose private data like photos, web browsing history, chat history, etc. Generally, these sextortion scammers send emails & claim that they have gained access to the victim’s device, installed a Trojan virus by logging into […]

Scam Alert: Covid-19 Vaccine Phishing and Money Scam Hits India

Scam Alert: Covid-19 Vaccine Phishing and Money Scam Hits India

As the COVID-19 vaccination drive kicks off in India, phishing scammers are looking to cash in on people’s quest to get the vaccine. Adversaries are tricking users into handing over cash or financial details in a recent bolstered vaccination scam through some bogus websites. Here’s how these scammers benefit themselves and put beneficiaries at potential […]

cyber risks

Moving to the cloud? Learn how to manage your cyber risks on the journey to cloud transformation

Cloud adoption has witnessed exponential growth over the past few years. However, it brings forth a new set of cyber risks that endanger organizations and their customers. In the best-case scenario, these unknown cyber risks may result in increased costs, while in the worst-case scenario, these risks can lead to loss of customers, reputation, business, […]

ransomware attacks

Mitigating Ransomware Attacks: How to keep you and your family safe

There’s a rise in ransomware attacks, and they’re becoming deadlier and more dangerous than ever! A report by Cybersecurity Ventures predicted that businesses in 2021 would fall victim to a ransomware attack every 11 seconds! The total cost of ransomware to businesses would top USD 20 billion this year. Quick Heal Threat Report Q1 2021 detected 0.35 million ransomware […]

FormBook

FormBook Malware Returns: New Variant Uses Steganography and In-Memory Loading of multiple stages to steal data

Quick Heal Security Lab has seen a sudden increase in dotnet samples which are using steganography. Initially, in the static analysis, not much information is available. It resembles some simple application going by the method name. On the dynamic side, some show the activity but another check for sandboxing environment. Apart from this, even on […]

Warzone RAT

WARZONE RAT – Beware Of The Trojan Malware Stealing Data Triggering From Various Office Documents

Warzone RAT is part of an APT campaign named “Confucius.” Confucius APT is known to target government sectors of China and a few other South Asian countries. This APT campaign was quite active around January 2021. Warzone RAT first emerged in 2018 as malware-as-a-service (MaaS) and is known for its aggressive use of “.docx” files […]

RockYou2021

RockYou2021: Massive data leak of passwords on the dark web

  The issue of a data breach continues to plague the world of cybersecurity. What seems to be the most extensive password collection of all time has been leaked on the dark web. The source? An anonymous forum poster uploaded a 100GB TXT compilation file of stolen and leaked passwords, containing 8.4 billion entries.  Here’s everything you […]