Lockbit 3.0

Uncovering LockBit Black’s Attack Chain and Anti-Forensic Activity

Since the infamous Conti ransomware group disbanded due to source code leaks during the Russia-Ukraine war, the LockBit group has claimed dominance. The group has adopted new extortion techniques and added a first-of-its-kind bug-bounty program, along with many features, to advance their new leak site. Upon investigation and analysis, we have determined that the new […]

AsyncRAT

AsyncRAT Analysis with ChatGPT

  As cyber threats continue to evolve and become more sophisticated, it’s crucial for security researchers and professionals to stay ahead of the curve. In this post, ⦁ We will explore how ChatGPT can assist in the analysis of malware, specifically the Remote Access Trojan (RAT) known as AsyncRAT and, ⦁ We will also delve […]

Vishing Attack

Protect yourself from Vishing Attack!!

“Humans are the weakest link in cybersecurity.” Data breaches worldwide prove this accurate, as human errors, lack of awareness, ignorance, or negligence cause these breaches. Social engineering is the attack that exploits human behavior and human nature, and there are different ways to perform this attack. Attackers often manipulate and convince users with valid authority, […]

Proactive Measures to Safeguard against the Ransomware Menace

  Ransomware is a sophisticated malware that infects computing devices and holds the data hostage intending to extort money from its victims. Ransomware uses encryption techniques that render the victim’s data unusable. Ransomware attacks have evolved with time, and the encryption techniques to harm victims have also become sophisticated, which are often challenging to break. […]

blog news

Your Data and Devices are safe with Quick Heal

  On 19th November at 8:17 am, we became aware of a false positive detection on excel files and the same getting quarantined on some customer devices. We sincerely regret the inconvenience caused. We immediately took necessary actions investigating the matter, thereby initiating a root cause analysis. We would like to share that this issue was […]

Quick Heal version23

Quick Heal Launches an all new version 23 – Smart, Secure and Sustainable

Cybercrimes have been on the rise post-pandemic and are becoming even more sophisticated. Digitization and work from home model have further widened the security perimeter, making cloud, network, and devices vulnerable.  Thus, allowing cybercriminals to surpass the basic and traditional security measures available for free. We are witnessing a tremendous rise in internet and smartphone […]

QBOT – A HTML Smuggling technique to target victims

QBot, also known as Qakbot, QuackBot, and Pinkslipbot, is a Banking Trojan that was first observed in 2007. Today, Qbot is still a vicious and persistent threat to organizations and has become one of the leading Banking Trojans globally. Over the years, it has changed its initial techniques to deliver payloads like using VBA macros, […]

Are Malware operators using NSIS Installers to bombard Stealers and avoid detection?

  Threat actors have been using new techniques to hide their codes and avoid detection in every manner. They now use a new trend through NSIS (Nullsoft Scriptable Install System), which is an open-source installer that can bundle various files together. In the past, Malware attackers have used this NSIS-based crypter to hide themselves. This […]