Phishers using custom 404 Not Found error page to steal Microsoft credentials

Credit to Author: Sushmita Kalashikar| Date: Wed, 21 Aug 2019 13:09:28 +0000

In the latest of its kind phishing attacks, phishers have been found to use custom 404 Not Found error pages to run phishing campaign. This unusual phishing campaign is basically aimed at tricking unsuspecting victims into sharing their Microsoft login credentials. A 404 Not Found page is typically an indication…

Read more

Alert! 27 apps found on Google Play Store that prompt you to install Fake Google Play Store

Credit to Author: Vaibhav Billade| Date: Mon, 19 Aug 2019 10:29:14 +0000

Quick Heal Security Lab spotted 27 malicious apps of dropper category on official “Google Play Store”. These apps have been removed from Play Store after Quick Heal Security Lab reported it to Google last week. These apps continuously show installation prompt for fake “Google Play Store”. If any user falls…

Read more

Alert! Income tax refund SMS – Newest way of conducting bank fraud by cyber criminals

Credit to Author: Sushmita Kalashikar| Date: Fri, 09 Aug 2019 07:22:12 +0000

Scammers are literally on their toes all year round, but for all the wrong reasons, devising ways and means to trick innocent people. In their latest attempt at fraud, cyber criminals are using fake SMS pretending to be from Income Tax Department to trick innocent victims into sharing bank account…

Read more

Android based IoT devices with open ADB port inviting easy attacks by Crypto-miners

Credit to Author: Sushmita Kalashikar| Date: Wed, 07 Aug 2019 11:10:07 +0000

The rapid pace at which connected smart home devices are increasing, have opened the gates for a new era of cyber-attacks on IoT devices including smart phones, TVs, IP cameras, etc. These attacks are mostly in the form of crypto mining attacks wherein cryptocurrency-mining botnet enters the targeted device via…

Read more

MegaCortex Returns…

Credit to Author: Shriram Munde| Date: Tue, 30 Jul 2019 07:27:12 +0000

MegaCortex, a ransomware which was first spotted in January this year, has become active again and has changed the way it previously attacked/targeted the corporate world. In order to simplify its execution and increase its scale of operation, it uses ‘Command Prompt’ instead of ‘PowerShell’ in current targeted campaign. Key…

Read more

Trinity Miner using open ADB port to target IoT devices

Credit to Author: Vallabh Chole| Date: Fri, 26 Jul 2019 10:08:11 +0000

In the 21st century, life is becoming smart and evolving at a fast pace. Even day to day gadgets are becoming smarter. All these IoT devices are powered by ARM-based processor and run on android and unix operating system. These IoT devices include mobiles, smart T.V., routers, IP cameras and…

Read more

Webcam Hacking – How to prevent webcam from hacking into your privacy?

Credit to Author: Sushmita Kalashikar| Date: Fri, 19 Jul 2019 09:48:21 +0000

Imagine a day when you open your inbox and there’s this one mail containing obscene pics of you flashing on the screen. Right below is a message asking you to pay a hefty ransom to prevent your pics from getting shared with all your accounts. The thought itself is enough…

Read more

Ransomware As A Tool – LockerGoga

Credit to Author: Ghanshyam More| Date: Wed, 03 Jul 2019 07:18:00 +0000

Ransomware authors keep experimenting with the development of payload in various dimensions. In the timeline of ransomware implementations, we have seen its evolution from a simple screen locker to multi-component model for file encryption, from novice approach to a sophisticated one. The Ransomware as a Tool has evolved in wild…

Read more

Beware! Email attachments can make you victim of spear phishing attacks

Credit to Author: Prashant Tilekar| Date: Fri, 21 Jun 2019 09:15:28 +0000

In the last few months, we’ve seen a sudden increase in Spear Phishing attacks. Spear phishing is a variation of a phishing scam wherein hackers send a targeted email to an individual which appears to be from a trusted source. In this type of attack, the attacker uses social engineering tricks and some…

Read more