{"id":82893,"date":"2016-05-19T12:39:24","date_gmt":"2016-05-19T07:09:24","guid":{"rendered":"https:\/\/blogs.quickheal.com\/?p=82893"},"modified":"2016-06-06T15:21:13","modified_gmt":"2016-06-06T09:51:13","slug":"a-report-by-quick-heal-labs-on-password-stealing-malware","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/a-report-by-quick-heal-labs-on-password-stealing-malware\/","title":{"rendered":"A Report by Quick Heal Labs on Password Stealing Malware"},"content":{"rendered":"<p>Almost every computer user has more than one account for social networking sites, email accounts, bank accounts, online shopping portals, etc. And for obvious reasons, it becomes difficult for them to remember their login credentials, and this gives away to a habit of saving username and passwords in web browsers, email clients, FTP clients, etc. There are several malware in the wild designed to steal such stored passwords. Stolen passwords are used by hackers in various campaigns like phishing emails attacks, hosting malicious files on FTP or web servers and to fetch handsome money in online black markets. Business enterprises can pay a heavy price if the accounts of their important or key employees are compromised.<\/p>\n<p>Malware authors are increasingly using automation tools to manage the data they manage to steal. This post gives an insight into a password-stealing malware campaign which was started in March 2016.<\/p>\n<p><strong>Download this PDF to read the complete report<\/strong><\/p>\n<p><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/05\/Password_Stealing_Malware_Report.pdf\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-82869 alignnone\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/05\/PDF-icon.png\" alt=\"PDF icon\" width=\"100\" height=\"101\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/05\/PDF-icon.png 256w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/05\/PDF-icon-150x150.png 150w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/05\/PDF-icon-70x70.png 70w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/05\/PDF-icon-80x81.png 80w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/05\/PDF-icon-45x45.png 45w\" sizes=\"(max-width: 100px) 100vw, 100px\" \/><\/a><\/p>\n<p><strong>Security measures to take<\/strong><br \/>\n1. Don\u2019t save credentials on web browsers for your personal accounts.<br \/>\n2. Don\u2019t open attachments or click on links in emails from unknown or unsolicited sources.<br \/>\n3. Apply security patches and updates for Operating System, Microsoft Office, Adobe Reader, Java and other programs\/applications.<br \/>\n4. Keep Macro execution option disabled for Microsoft office as attackers are increasingly using Macro-based malware.<\/p>\n<p>&nbsp;<\/p>\n<p><strong><span style=\"color: #666666;\">ACKNOWLEDGMENT<\/span><\/strong><\/p>\n<p><strong>Subject Matter Expert<\/strong><br \/>\n\u2022 Sagar Daundkar (Threat Research &amp; Response Team, Quick Heal)<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Almost every computer user has more than one account for social networking sites, email accounts, bank accounts, online shopping portals, etc. And for obvious reasons, it becomes difficult for them to remember their login credentials, and this gives away to a habit of saving username and passwords in web browsers, email clients, FTP clients, etc. [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":82904,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[24,151],"tags":[49,1322],"class_list":["post-82893","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-malware","category-password","tag-malware","tag-password-stealing"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/82893"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=82893"}],"version-history":[{"count":7,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/82893\/revisions"}],"predecessor-version":[{"id":83026,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/82893\/revisions\/83026"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media\/82904"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=82893"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=82893"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=82893"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}