Estimated reading time: 5 minutes
Quick Heal Labs have been tracking this Cyber-espionage operation since 2016. We have identified this attack as operation m_project. From the past year, we have seen a surge in these APT activities. Modus operandi of the attackers have remained...
Estimated reading time: 6 minutes
Cyber-attacks through phishing emails are increasing and generally, attackers use DOC embedded macros to infiltrate victim’s machine. Recently Quick Heal Security Labs came across a Phishing e-mail sample which uses Microsoft’s equation editor exploit to spread Hawkeye keylogger. Cybercriminals...
Estimated reading time: 3 minutes
Increasingly, hacker and other malicious criminals are increasing email attachments to inject malware into their targets. Malware disguised as an email attachment represents an easy target – the recipient of the mail may unknowingly open the attachment without even...