Deep Dive into Royal Ransomware

The rise of ransomware and malware variants has been a growing concern for individuals and organizations alike. With new strains of malicious software emerging every day, the threat landscape has become increasingly complex and dangerous. Let’s delve into the world of ransomware and explore how we can protect ourselves against this ever-evolving threat. Introduction  The […]

THE PERILS OF RANSOMWARE : How to Save yourself from the next attack

In recent years, ransomware attacks have increased in frequency and sophistication, resulting in substantial impact across numerous industries and sectors worldwide. A typical ransomware attack encrypts computer systems, and blocks access to the user’s or company’s own data, and a ransom is demanded as payment in exchange of its release. In this blog, we will […]

Expiro: Old Virus Poses a New Challenge

A recent virus infection faced by some users was swiftly detected as being caused by Expiro. We have conducted an in-depth investigation and analysis on the intricacies of Expiro and what makes it such a potent threat. This article lays out our analysis and understanding of the matter from our Security Research Lab and offers […]

Your Office Document is at Risk – XLL, A New Attack Vector

  Microsoft Office documents are used worldwide by both corporates and home-users alike.  It’s different office versions, whether licensed or unlicensed offers users an easy way to create and modify files. However, this software is also susceptible to cyberattacks. Cybercriminals often take advantage of its vulnerability and use VBA (Visual Basic Application) macros as entry […]

What is Cryptojacking? | Detection and Ways of Preventions - Quick heal

Cryptojacking on the Rise

There has been a steep rise in Cryptojacking attacks by cybercriminal groups to infiltrate networks and stealthily mine for coins. With a visible annual increase by 37%, Quick Heal has detected 14.3 Million cases of these attacks through 2022. Large-scale cryptojacking is fast emerging as a popular trend in the Cybercrime scenario. Let us explore […]

Lockbit 3.0

Uncovering LockBit Black’s Attack Chain and Anti-Forensic Activity

Since the infamous Conti ransomware group disbanded due to source code leaks during the Russia-Ukraine war, the LockBit group has claimed dominance. The group has adopted new extortion techniques and added a first-of-its-kind bug-bounty program, along with many features, to advance their new leak site. Upon investigation and analysis, we have determined that the new […]

AsyncRAT

AsyncRAT Analysis with ChatGPT

  As cyber threats continue to evolve and become more sophisticated, it’s crucial for security researchers and professionals to stay ahead of the curve. In this post, ⦁ We will explore how ChatGPT can assist in the analysis of malware, specifically the Remote Access Trojan (RAT) known as AsyncRAT and, ⦁ We will also delve […]