Deconstructing a Cyber Deception: An Analysis of the Clickfix HijackLoader Phishing Campaign 

Table of Contents  Introduction  The Evolving Threat of Attack Loaders  Objective of This Blog  Technical Methodology and Analysis  Initial Access and Social Engineering  Multi-Stage Obfuscation and De-obfuscation  Anti-Analysis Techniques  The Final Payload  Conclusion  IOCs  Quick Heal \ Seqrite Protection  MITRE ATT&CK Mapping    Introduction  With the evolution of cyber threats, the final execution of a […]

The post Deconstructing a Cyber Deception: An Analysis of the Clickfix HijackLoader Phishing Campaign  appeared first on Blogs on Information Technology, Network & Cybersecurity | Seqrite.

September 12, 2025
Read More >>

Malware Campaign Leverages SVGs, Email Attachments, and CDNs to Drop XWorm and Remcos via BAT Scripts

Table of Content: Introduction Infection Chain Process Tree Campaign 1: – Persistence – BATCH files – PowerShell script – Loader – Xworm/Remcos Campaign 2 Conclusion IOCS Detections MITRE ATTACK TTPs Introduction: Recent threat campaigns have revealed an evolving use of BAT-based loaders to deliver Remote Access Trojans, including XWorm and Remcos. These campaigns often begin […]

The post Malware Campaign Leverages SVGs, Email Attachments, and CDNs to Drop XWorm and Remcos via BAT Scripts appeared first on Blogs on Information Technology, Network & Cybersecurity | Seqrite.

September 11, 2025
Read More >>

PromptLock: The First AI-Powered Ransomware & How It Works

Introduction AI-powered malware has become quite a trend now. We have always been discussing how threat actors could perform attacks by leveraging AI models, and here we have a PoC demonstrating exactly that. Although it has not yet been observed in active attacks, who knows if it isn’t already being weaponized by threat actors to […]

The post PromptLock: The First AI-Powered Ransomware & How It Works appeared first on Blogs on Information Technology, Network & Cybersecurity | Seqrite.

August 29, 2025
Read More >>

SnakeKeylogger: A Multistage Info Stealer Malware Campaign

SnakeKeylogger – A Multistage Info Stealer Malware Campaign Info-stealer malware has become a growing threat, with attackers constantly refining their techniques to evade detection. Among these threats, SnakeKeylogger has emerged as one of the highly active credential-stealing malware, targeting individuals and businesses. Known for its multi-stage infection chain and stealthy in-memory execution, SnakeKeylogger is designed […]

The post SnakeKeylogger: A Multistage Info Stealer Malware Campaign appeared first on Blogs on Information Technology, Network & Cybersecurity | Seqrite.

March 25, 2025
Read More >>

Fake CAPTCHA Lures Victims: Lumma Stealer Abuses Clipboard and PowerShell

Fake CAPTCHA Lures Victims: Lumma Stealer Abuses Clipboard and PowerShell Introduction: We recently identified a new malware campaign using fake CAPTCHA pages to deliver Lumma Stealer, an infostealer operating under the malware-as-a-service (MaaS) model, first discovered in 2022. In previous campaigns, including those in mid-2024, attackers used ClickFix a deceptive tactic involving phishing and fake […]

The post Fake CAPTCHA Lures Victims: Lumma Stealer Abuses Clipboard and PowerShell appeared first on Blogs on Information Technology, Network & Cybersecurity | Seqrite.

February 25, 2025
Read More >>

XWorm: Analyzing New Infection Tactics With Old Payload

Introduction: Attackers are continuously developing different techniques to infect systems and steal sensitive information. A recent campaign a multi-stage infection chain that starts with a LNK file, which lures the victim into opening an invoice in a web browser. In the background, it performs a series of malicious activities that infect the system with a […]

The post XWorm: Analyzing New Infection Tactics With Old Payload appeared first on Blogs on Information Technology, Network & Cybersecurity | Seqrite.

December 4, 2024
Read More >>