Coronavirus-themed Campaign delivers Agent Tesla Malware

  Summary: While the whole world fights against the COVID-19 pandemic, cybercriminals are busy exploiting the situation and attacking vulnerable users & businesses. In the last few weeks, there has been a rise in coronavirus-themed mail spams, which are being used to deliver a variety of malware. At Quick Heal Security Labs, we have observed […]

Log4Shell vulnerability

CVE-2021-44228: New Apache Log4j ‘Log4Shell’ Zero-Day Being Exploited in the Wild

A critical zero-day vulnerability (CVE-2021-44228) recently discovered Apache Log4J, the popular java open source logging library used in countless worldwide applications. The maximum severity vulnerability has been identified as ‘Log4Shell‘, which, if exploited, could permit a remote attacker to take control of vulnerable systems and execute arbitrary code remotely. According to some security researchers, the […]

Multi-Staged JSOutProx RAT Targets Indian Co-operative Banks and Finance Companies

  Quick Heal Security Labs has been monitoring various attack campaigns using JSOutProx RAT against different SMBs in the BFSI sector since January 2021. We have found multiple payloads being dropped at different stages of its operations. Although the RAT campaigns have also been previously reported on other countries, those targeting Indian companies are operated […]

cryptocurrency

Blockchain & Fraud Prevention: Strategies to overcome the cryptocurrency scam

What is Cryptocurrency?  Cryptocurrency is a type of digital currency that generally only exists electronically. There is no physical coin or bill unless you use a service to cash in cryptocurrency for a physical token. You usually exchange cryptocurrency with someone online, with your phone or computer, without using an intermediary like a bank. Bitcoin […]

Sextortion Scam

Sextortion Scam: Blackmail scam emails that demand Bitcoin

What is Sextortion?  Sextortion is a scam via email or any other medium to blackmail the victim and threaten to expose private data like photos, web browsing history, chat history, etc. Generally, these sextortion scammers send emails & claim that they have gained access to the victim’s device, installed a Trojan virus by logging into […]

cyber risks

Moving to the cloud? Learn how to manage your cyber risks on the journey to cloud transformation

Cloud adoption has witnessed exponential growth over the past few years. However, it brings forth a new set of cyber risks that endanger organizations and their customers. In the best-case scenario, these unknown cyber risks may result in increased costs, while in the worst-case scenario, these risks can lead to loss of customers, reputation, business, […]