# Tags

Be aware! Hiddad Malware present on Google Play Store.

Quick Heal Security Lab has spotted a couple of applications on play store which hide themselves after installation and display full screen ads after specific time interval. This trend is used by most of the developers these days to earn profit by displaying ads. Even if users want to uninstall these applications, they won’t be […]

Android malware that combines a Banking Trojan, Keylogger, and Ransomware in one package

This malware has all basic functionalities of the Android banker along with additional features like call forwarding, sound recording, keylogging and ransomware activities. It has the ability to launch user’s browser with URL received from the C&C server. It repeatedly opens the accessibility setting page until the user switches ON the ‘AccessibilityService’. The AccessibilityService allowing the Trojan to […]

Again! A New .NET Ransomware Shrug2

For several months, Quick Heal Security Labs has been observing an increase in ransomware which are built in  .NET framework. Ransomware like SamSam, Lime and now Shrug was found to be built in .NET framework. Malware authors are finding it very easy to build and obfuscate malware in .NET framework rather than making them in other compilers. Quick Heal Security […]

Cryptocurrency miner hits IoT devices, mostly affects Brazil and Russia!

According to a blogpost published on Aug 1, 2018, 200,000 routers in Brazil were compromised to deliver Cryptocurrency mining scripts to mine Monero (XMR) cryptocurrency. Hackers compromised the vulnerable MikroTik routers by injecting CoinHive scripts into the routers web pages in order to carry out the mass Cryptocurrency miner attack. The IDS/IPS research team at […]

Beware of the Armage Ransomware – the File Destroyer!

In July last week, Quick Heal Security Labs detected a new ransomware called Armage. It appends ‘.Armage’ extension to files it encrypts. Armage ransomware uses the AES-256 encryption algorithm to encode files making them inoperable. It spreads via spam emails and corrupted text files. Technical analysis Once executed on the infected computer, Armage ransomware opens […]

Threats to your digital life are increasing. Are you doing anything about it?

It’s an exciting age to be alive! We are rapidly advancing towards greater heights of technology paying witness to inventions like the Internet of Things (IoT), Artificial Intelligence, Flying Cars, and the prospect of traveling to space as an excursion! The word ‘exciting’ fails to define these milestones mankind is achieving on its way to […]

Data Privacy. What is that?

With the heavy penetration of the Internet into almost every household, data privacy has had its day. The Facebook data leak scandal which rocked the tech industry is a blistering example of the way our privacy is getting compromised at the cost of our obsession with social networking or the Internet for that matter. To […]

Beware of the ‘Free Cycle Distribution Yojana’ WhatsApp message. It’s fake!

As India’s Independence Day (15th of August) approaches, messages about free distribution schemes are doing the rounds on WhatsApp. Just recently, Quick Heal Security Labs detected a widespread circulation of one such message claiming that the Indian government will distribute free cycles to students on Independence Day, under the Free Cycle Distribution Yojana (scheme) Government […]

The evolution of a 4-year-old-threat Emotet: From an infamous Trojan to a complex threat distributer

Emotet malware campaign has been existing for a long time. It comes frequently in intervals with different techniques and variants to deliver malware on a victim. Attackers are smart and they use complex techniques to avoid detection. At the start of 2017, we had seen the emotet campaign spreading through email attached PDF and JS […]

Quick Heal Total Security (Windows) achieves a 99.5% protection rate in AV-Comparatives’ test

Quick Heal Total Security (Windows) has achieved a 99.5% protection rate in the Real-World Protection Test conducted by world’s leading security software testers AV-Comparatives. Real-World Protection Test February-June 2018 Experts at AV-Comparatives create a real-world environment to test security software. In this environment, malware (malicious software) behave in the same way as they would in […]