Beware: Fake Apps posing as Open AI’s ChatGPT App

Beware!  Behind the face of advancing technology lies a dark underbelly – that of evolving cyber crime. Here, perpetrators continually adapt their strategies, exploiting current events, government websites, and even trusted organizations’ legitimate applications to deceive users. This sophisticated approach involves the use of trusted names and logos to entice individuals into downloading fake apps […]

THREAT ADVISORY: Zero-Day Vulnerabilities Detected on WinRAR

Zero-day vulnerabilities represent an imminent threat to cybersecurity, and in this case, two such vulnerabilities, CVE-2023-38831 and CVE-2023-40477, have been identified in the widely utilized WinRAR software. These vulnerabilities pose a grave concern due to their potential for remote code execution, presenting a severe threat risk.  WinRAR is a popular compression tool with half a […]

Mallox Ransomware Strikes Unsecured MSSQL Servers

Introduction: First observed in the middle of 2021, ‘Mallox’ Ransomware has emerged as a formidable threat in the cyber crime landscape. With its ability to encrypt all volumes, including local and network shared drives, it gradually spreads its control over the system, leaving victims in a state of digital despair. Mallox Ransomware uses the “.mallox” […]

THE PERILS OF RANSOMWARE : How to Save yourself from the next attack

In recent years, ransomware attacks have increased in frequency and sophistication, resulting in substantial impact across numerous industries and sectors worldwide. A typical ransomware attack encrypts computer systems, and blocks access to the user’s or company’s own data, and a ransom is demanded as payment in exchange of its release. In this blog, we will […]

Expiro: Old Virus Poses a New Challenge

A recent virus infection faced by some users was swiftly detected as being caused by Expiro. We have conducted an in-depth investigation and analysis on the intricacies of Expiro and what makes it such a potent threat. This article lays out our analysis and understanding of the matter from our Security Research Lab and offers […]

Your Office Document is at Risk – XLL, A New Attack Vector

  Microsoft Office documents are used worldwide by both corporates and home-users alike.  It’s different office versions, whether licensed or unlicensed offers users an easy way to create and modify files. However, this software is also susceptible to cyberattacks. Cybercriminals often take advantage of its vulnerability and use VBA (Visual Basic Application) macros as entry […]

AsyncRAT

AsyncRAT Analysis with ChatGPT

  As cyber threats continue to evolve and become more sophisticated, it’s crucial for security researchers and professionals to stay ahead of the curve. In this post, ⦁ We will explore how ChatGPT can assist in the analysis of malware, specifically the Remote Access Trojan (RAT) known as AsyncRAT and, ⦁ We will also delve […]

Proactive Measures to Safeguard against the Ransomware Menace

  Ransomware is a sophisticated malware that infects computing devices and holds the data hostage intending to extort money from its victims. Ransomware uses encryption techniques that render the victim’s data unusable. Ransomware attacks have evolved with time, and the encryption techniques to harm victims have also become sophisticated, which are often challenging to break. […]

Quick Heal version23

Quick Heal Launches an all new version 23 – Smart, Secure and Sustainable

Cybercrimes have been on the rise post-pandemic and are becoming even more sophisticated. Digitization and work from home model have further widened the security perimeter, making cloud, network, and devices vulnerable.  Thus, allowing cybercriminals to surpass the basic and traditional security measures available for free. We are witnessing a tremendous rise in internet and smartphone […]

Are Malware operators using NSIS Installers to bombard Stealers and avoid detection?

  Threat actors have been using new techniques to hide their codes and avoid detection in every manner. They now use a new trend through NSIS (Nullsoft Scriptable Install System), which is an open-source installer that can bundle various files together. In the past, Malware attackers have used this NSIS-based crypter to hide themselves. This […]