Blog

Cyber crime

Emotet Trojan is back as the world unlocks

 September 26, 2020

Estimated reading time: 5 minutes

A threat actor named Emotet Trojan has been in the wild for more than 5 years, and now it is back after a 5 months break. It has spread globally, infecting new as well as old targets. It is re-launched with multiple Malspam Campaigns to distribute in all sectors. We...

How social media is used to commit financial fraud

 September 21, 2020

Estimated reading time: 2 minutes

Social media is a fraudster’s heaven. There are billions of targets – Facebook itself had over 2.6 billion monthly active users in the first quarter of 2020. Because of the very nature of these platforms, users can be quite careless about the amount of personal information they post. For cybercriminals,...

Data Breach – Understanding the severity of it

 July 15, 2020

Estimated reading time: 2 minutes

A data breach is a security gap in which information or data is accessed or stolen without authorization. It is a breach of trust between the owner of the data and the party that accesses it without consent. To put it in simpler terms it a nonconsensual usage of someone’s...

Poulight- An info-stealing trojan might be teaching you how to play Minecraft

 June 22, 2020

Estimated reading time: 7 minutes

Poulight is an info-stealer trojan which most probably originated in Russia. It is written in the .NET and can collect sensitive information and deliver it to cybercriminals. Ever since its first appearance, it has been growing substantially and taking different forms. The main Infection vector remains spear-phishing emails. It was...

Way Out of The MAZE: A Quick Guide For Defending Against Maze Ransomware

 April 23, 2020
The modus operandi of the Maze Ransomware

Estimated reading time: 6 minutes

From late 2019, MAZE Ransomware started becoming infamous for its Encryption, data stealing and the subsequent selling of the stolen data. Few other reasons behind its popularity are also its unique targets and the ransom demands. From its inception around May 2019, MAZE actors are targeting multiple sectors, prominent ones...

Ako Ransomware targeting businesses using RaaS

 January 24, 2020

Estimated reading time: 5 minutes

Ako Ransomware targeting businesses using RaaS Quick Heal security researchers recently observed ransomware that uses RaaS (Ransomware as a Service) which is a subpart of MaaS (Malware as a Service). Before delving into the AKO ransomware or RaaS, one must understand what Malware as a Service means, as it is...

How to protect yourself from becoming victim of UPI frauds?

 October 18, 2019

Estimated reading time: 3 minutes

A new and interesting kind of cyber theft is making rounds in the cyber world. This time the theft involves UPI (Unified Payments Interface) as the medium for tricking innocent victims into losing their money. The increasing popularity and ease of use of digital payment apps like Google Pay or...

Cybersquatting and Typosquatting victimizing innocent customers and brands

 August 28, 2019

Estimated reading time: 2 minutes

The rapid shift of brands towards online platforms and ecommerce portals, has opened the gates for cyber threats like Phishing, Cybersquatting and Typosquatting. In fact, every entity with an online presence today, feels burdened by the fear of compromising their brand reputation, in the face of these ubiquitous cyber threats....

Alert! Income tax refund SMS – Newest way of conducting bank fraud by cyber criminals

 August 9, 2019

Estimated reading time: 2 minutes

Scammers are literally on their toes all year round, but for all the wrong reasons, devising ways and means to trick innocent people. In their latest attempt at fraud, cyber criminals are using fake SMS pretending to be from Income Tax Department to trick innocent victims into sharing bank account...

Ransomware As A Tool – LockerGoga

 July 3, 2019

Estimated reading time: 5 minutes

Ransomware authors keep experimenting with the development of payload in various dimensions. In the timeline of ransomware implementations, we have seen its evolution from a simple screen locker to multi-component model for file encryption, from novice approach to a sophisticated one. The Ransomware as a Tool has evolved in wild...